Threatpost Poll: Is It Impossible to Secure Mobile Devices?

2019-02-11T20:17:21
ID THREATPOST:A1D6DD02FF47FD042A9C2C9EBA101DAA
Type threatpost
Reporter Lindsey O'Donnell
Modified 2019-02-11T20:17:21

Description

Between applications and operating systems, a slew of mobile threats continue to pop up – and when it comes to security, it’s getting harder and harder for enterprises to keep up.

Just in the past week, Apple patched a massive flaw in its FaceTime allowing a bad actor to eavesdrop on victims; while a malicious app that aimed to steal cryptocurrency from users was removed from Google’s official Android App Store.

Are enterprise companies prepared to take on this onslaught of security threats as the workforce becomes increasingly dependent on mobile devices? You can weigh in below with our Threatpost poll.

Take Our Poll

Take Our Poll

Take Our Poll

Take Our Poll

Take Our Poll

Take Our Poll

Take Our Poll

Interested in learning more about mobile enterprise security threats and best practices? Don’t miss our free __Threatpost webinar__ on Feb. 27 at 2 p.m. ET. Join Threatpost senior editor Tara Seals and a panel of mobile security experts, including Patrick Hevesi of Gartner, to discuss the top evolving threats and risks that are unique to this work-from-anywhere environment; best practices for addressing them; and new challenges on the horizon, such as 5G services.