Page 22 - Mobile Data Loss
P. 22
16 Mobile Data Loss
SUMMARY
What we’ve provided is a categorization of mobile threat vectors to
provide a baseline for outlining countermeasures. These include:
• Mobile operating system compromises
• Malicious and Risky Apps
• User-driven data loss
• Mobile network threats
Threats will continue to emerge over time. For example, smart-
watches, wearables, and the Internet of Things (IoT) are all devices
that can pair with mobile devices. Later in the book I’ll outline this
emerging threat and countermeasures for protecting enterprise data.
What’s important is to stay on top of those threats by subscribing to
threat news feeds, embracing your security vendor notifications, and
doing your own research. It’s all part of the security lifecycle. In the
next chapter, I’ll begin to outline countermeasures to these threats and
outline a strategy to tackle them from proactive, reactive, and live
scenarios.