Cybersecurity breaches continue to be the stuff of nightmares for Australian CIOs. Last year, the country lay siege to a surge in cyberattacks and escalating data breaches. According to the government @cyber.gov.au, mobile malware detections spiked at almost three times the rate of the previous year.
Equally troublesome were the findings from Verizon’s 7th annual Mobile Security Index report for 2024, where it identified a rise in reported security risks connected to mobile devices. At a time when everyone’s reliance on mobile devices has never been greater, IT leaders need to be super aware of the weakest links in their security arrangements. Even if companies are doing everything by the book, it could be their employees lack of understanding of security measures that creates the vulnerability. And no company can be complacent. Verizon’s report found that even mobile phishing attacks on high tech firms (no names were mentioned) had a 33% success rate.
More sophisticated cyberattacks
Of course, the number of mobile connections in Australia has ramped up in recent times, creating a multitude of entry points for attackers. In 2024, these connections totalled 33.5 million, more than 20 million of which were used predominantly for business purposes. From mobile knowledge workers to field-based staff, remote workers, and specialised logistics teams, as well as the world of WFH employees, mobile connectivity is essential.
Organisations on high alert
And with the emergence of shiny new AI tools, you can expect attackers to become more sophisticated, employing advanced tactics and making AI-assisted attacks in the form of deepfakes and SMS phishing. There are surging instances of phishing and smishing (SMS phishing), malware and ransomware attacks, spyware planting, as well as opportunities to exploit device OS vulnerabilities through app-based attacks mobile devices. This means mobile devices should be viewed as a vulnerable point of entry into corporate systems, putting mounting pressure on security professionals in the IT team to double-down on protecting business mobile endpoints.
In terms of mobile security, it’s a matter of mitigating risk from employees being blithely unaware of security best practices and the sheer number of mobile connections.
What to do?
Thankfully, we’re not quite at the point of King Canute trying in vain to hold back the tide when it comes to securing organisations from relentless waves of cybersecurity threats. Mitigation strategies provide an effective first line of defence and include:
• Device management tools and best practices
• Authentication and policy enforcement
• Encryption, permissions and app management
What’s more, just as hackers get more sophisticated, so do mobile threat defence and management technologies. To get clued-up on the latest advancements in mobile cybersecurity strategies, join us at our roundtable lunch. At this event, our analyst will discuss the size and scope of mobile cybersecurity attacks in Australia and experts will present case studies on real world scenarios and solutions. There will also be time to network with your peers and discuss their experiences and strategies.
Roundtable lunch: | Cybersecurity on the Go: Protecting Business Mobile Endpoints |
Date: | Thursday 27 February 2025 |
Location: | Brisbane City |
RSVP: | Click here for more information and to register |
If you’re interested but can’t get to Brisbane on Thursday 27 February, be sure to let us know. We’ll be sharing a wrap-up of the event in due course.
Mobile Security Health Check
In this age of mobility and flexible working, it’s critical to scrutinise all the entry points into your network and identify vulnerabilities. We can help you keep on the front foot in mobile data security best practices through our mobile security health check. Book yours today!