cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security
No Result
View All Result
Interviews, IT and Technology News India | CXO VOICE
No Result
View All Result
Home News Cyber Security

Lookout mobile phishing report shows a 37% increase in enterprise mobile phishing attacks

News Desk by News Desk
June 2, 2020
Reading Time: 3 mins read
mobile phishing Lookout
Share on FacebookShare on TwitterShare on LinkedinShare via E-Mail

Lookout’s 2020 mobile phishing report shows a 37% increase in enterprise mobile phishing encounter rate between the 2019 Q4 and Q1 of 2020. The report also indicates that un-mitigated mobile phishing threats could cost companies with 10,000 mobile devices as much as $35 million per occurrence and up to $150 million for companies with 50,000 mobile devices.

The Lookout mobile phishing report shows the various ways cybercriminals use to make their mobile phishing attacks more lucrative, and provides data on global encounter rates and the likely financial risk per occurrence. The phishing encounter rates are divided down by area, and by consumer and enterprise, to provide a broad understanding of the current state of mobile phishing attacks. 

Following are the Key highlights from the Lookout Mobile Phishing Report include: 

  1. Enterprise phishing encounter rates tracked quarterly show sequential increases of 37.1 percent globally as well as increases of 66.3 percent in North America, 25.5 percent in EMEA and 27.7 percent in Asia Pacific.
  2. Examples of the potential financial risk of up to $150 million per incident due to unmitigated phishing risks for healthcare, manufacturing and legal organizations.
  3. Research synopsis of a real-world phishing campaign that targeted over 4,000 North American banking customers.
  4. Examples of phishing attack delivery by a wide variety of mobile apps including SMS, social media and messaging apps in addition to email.
  5. Best practices for organizations of any size to protect against and detect mobile phishing attacks.

Due to the lockdown and pandemic crisis, most of the people working remotely is at a record high. To stay productive and complete the task, many employees have turned to their smartphones and tablets. Phishing has been the most usually used method for hackers to infiltrate a company, and businesses have used user practice and email phishing security to combat cybercriminals. But with mobile devices, phishing risks no longer hide in email, but in SMS, messaging apps, and social media platforms. In addition, with a smaller form factor and simplified user experience, mobile devices also make it harder to spot the tell-tale signs of a phishing link – enabling a higher success rate for the cybercriminals attacking mobile compared to desktop devices.

“Smartphones and tablets are trusted devices that sit at the intersection of their owner’s personal and professional identity,” said David Richardson, vice president of product management at Lookout. “Cybercriminals are exploiting the ability to socially engineer victims on their mobile device in order to steal their credentials or sensitive private data.”

“Smartphones and tablets are trusted devices that sit at the intersection of their owner’s personal and professional identity, Cybercriminals are exploiting the ability to socially engineer victims on their mobile device in order to steal their credentials or sensitive private data.”

said David Richardson, vice president of product management at Lookout.
  • Five tips for entrepreneurs to tide over the coronavirus crisis
  • How to overcome from COVID-19 uncertainty
  • Five tips for entrepreneurs to tide over the coronavirus crisis

Tags: cybersecuritycybersecurity and coronavirusFeaturedPhishing attackssecurity
News Desk

News Desk

by CXO VOICE team memebrs, contact@cxovoice.com

Related Posts

security
Cyber Security

DigitalOcean says some customer’s email addresses were exposed in a recent Mailchimp security breach

August 19, 2022
Malware and ransomware
Cyber Security

Ways To Mitigate Malware And Ransomware Attacks

August 19, 2022
CyberPeace
Cyber Security

Governor of Jharkhand Launches Ranchi University-IETE-CyberPeace – Center of Excellence (CoE)

August 19, 2022
Security flaws Xiaomi
Cyber Security

Xiaomi Fixes the Security Flaws In Its Mobile Payment Mechanism

August 19, 2022
Remote Work Requires a Redesigned Enterprise Network To Improved Security
Cyber Security

Remote Work Needs a Redesigned Enterprise Network to Strengthen Cybersecurity

August 19, 2022
Sundar Balasubramanian, The Dawn of a New (Ransomware) Age
Cyber Security

The Dawn of a New (Ransomware) Age

August 19, 2022
Cyber Security

Wranga and Disney Star India Partner to Conduct ‘Responsible Digital Citizenship and Online Safety’ Study

August 19, 2022
Cyber Security

CyberPeace Foundation and TASK, Government of Telangana Signs MoU to Collaborate for CyberSecurity Research and Skilling Initiatives

August 19, 2022
Load More
Next Post
Remote Working Technology

Technologies Help Remote Working Employees to Maintain Workflow

Discussion about this post

ADVERTISEMENT

Expert Views

Sundar Balasubramanian, The Dawn of a New (Ransomware) Age
Cyber Security

The Dawn of a New (Ransomware) Age

August 19, 2022
AI Cloud Enterprises
AI

What can AI Cloud do for Enterprises?

March 9, 2022
Data Modernisation
Technology

4 Key Trends Driving Data Modernization Across The Enterprises

January 28, 2022
IT Service Management (ITSM)
Enterprise

The need of ITSM to start a digital transformation journey and ensure high ROI

January 17, 2022
Cloud Adoption
Cloud

Cloud Adoption Needs to Be Accelerated

January 12, 2022

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Enterprises, and MSMEs IoT
Leaders Talk

IoT is now seen as an essential enabler for the enterprises to be future ready : Joyjeet Bose

-
Security While Working Remotely interview with Filip Coftas
Cyber Security

Security While Working Remotely [Interview]

-
Akita Security Device Help you Protect your Security During COVID-19 [Interview with Zakir Hussain]
COVID-19

Can Akita Security Device Help you Protect your Security During COVID-19 [Interview]

-
digital transformation and customer experience Newgen software
Interview

Digital Transformation Journey helps Newgen Software Improve Customer Experience [Interview]

-

Entrepreneur

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

Significance Of Ethical Entrepreneurship In The Post COVID-19 Economy

CXO VOICE is a premier resource for the enterprises, SMBs and Startups CXOs and business leaders, It enables CXOs and business executives gain access key insights, experts views, analysis, business strategy, and leaders interviews on what’s happening in the market and its impact.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com

Newsletter

Subscribe to our mailing list to receives newsletter direct to your inbox!

  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2021 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
  • Cyber Security

© 2021 CXO VOICE

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/