Page 22 - Mobile Data Loss
P. 22

16    Mobile Data Loss

          SUMMARY

          What we’ve provided is a categorization of mobile threat vectors to
          provide a baseline for outlining countermeasures. These include:

          • Mobile operating system compromises
          • Malicious and Risky Apps
          • User-driven data loss
          • Mobile network threats
             Threats will continue to emerge over time. For example, smart-
          watches, wearables, and the Internet of Things (IoT) are all devices
          that can pair with mobile devices. Later in the book I’ll outline this
          emerging threat and countermeasures for protecting enterprise data.
          What’s important is to stay on top of those threats by subscribing to
          threat news feeds, embracing your security vendor notifications, and
          doing your own research. It’s all part of the security lifecycle. In the
          next chapter, I’ll begin to outline countermeasures to these threats and
          outline a strategy to tackle them from proactive, reactive, and live
          scenarios.
   17   18   19   20   21   22   23   24   25   26   27