What would you say if I told you the total number of mobile devices in use is greater than the world’s population? There are an estimated 7.3 billion mobile devices in service for the 7 billion people in the world. Although that may seem impossible, look no further than your own home — the typical family has more than one device per person. Between laptops, smartphones and tablets, it seems everyone always has a mobile device within reach. In fact, these items have become so ubiquitous that we take exception to any situation or environment that does not accommodate us and our devices.

The Convenience of Mobile, But at What Risk?

We are so comfortable with our devices and the simplicity they bring to our lives that most of us don’t even think about the security issues that come with them. We store contact information for everyone we know, our favorite music, personal photos, appointments for ourselves and our kids, where we bank and shop and even our upcoming travel plans. Mobile devices know nearly everything about us. Virtually all our private information now lives inside a device that fits in our pocket and, unfortunately, could be easily become lost or stolen. Many of us have simply decided the convenience of taking everything we need everywhere we go is worth the risk of it ending up in the wrong hands.

Most of us assume our data is safe. Our phone locks and all the apps we install presumably have native security measures, too. However, are we assuming too much? Maybe so, according to recent IBM research on seemingly innocuous online dating applications. According to the study, there are security gaps in many dating apps that could be exploited to gain access to content on devices. While the study focused on dating apps, any of the apps we download and trust could be the opening cybercriminals need in order to gather sensitive information or deploy malware.

Boosting Your Mobile Security

IBM has designated four pillars of mobile security — device, content, application and transaction — and provides solutions to protect every pillar.

With IBM MaaS360 as the centerpiece of the IBM Mobile Security portfolio, companies can start with a solid foundation that secures the device, its data and its applications. Mobile Threat Management™ remediates mobile risks, including malware, suspicious system configurations and compromised devices, delivering a new layer of security for enterprise mobility management.

In today’s digital economy, the impact of the cloud, mobile, DevOps and security on business is pervasive. If you want to learn more, join IBM this week in Las Vegas at IBM InterConnect 2015 or participate remotely via InterConnectGO. Mobile security will be represented in the Mobile Enterprise section of InterConnect and within the Mobile Stream. Visit Booth No. 520 to participate in interactive sessions, win prizes and learn about mobile security in the process. Discover more by attending the Mobile Stream, which consists of 15 sessions designed to educate attendees about the most comprehensive security portfolio in the market.

more from Endpoint

IOCs vs. IOAs — How to Effectively Leverage Indicators

Cybersecurity teams are consistently tasked to identify cybersecurity attacks, adversarial behavior, advanced persistent threats and the dreaded zero-day vulnerability. Through this endeavor, there is a common struggle for cybersecurity practitioners and operational teams to appropriately leverage indicators of compromise (IOCs) and indicators of attack (IOAs) for an effective monitoring, detection and response strategy. Inexperienced security […]

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogramming, with a particular focus on its implementation […]