The Voice of Cyber®

BUSINESS

Newest Release

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

​Most organisations believe their risk is under control. Endpoints are hardened. Networks are monitored. Identity systems are layered and audited. Yet breaches continue and, increasingly, they don’t start where defenders are looking. Jeff Lindholm, Chief Revenue Officer at Lookout, talks about a shift that has been quietly reshaping cyber risk. Mobile or cell phone devices are now the most consistent starting point for credential theft, and most enterprises are still treating them as secondary. “The vast majority of breaches, at least 60% - initiate with credential theft,” Lindholm says. Breaches don’t usually begin with sophisticated exploits or perimeter failures. They begin with valid credentials, ...
No results found.

Deep Dive Articles

No results found.

In The News

No results found.