Mobile security is at the top of every company‘s worry list these days – and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive information out of the wrong hands is an increasingly intricate puzzle.

While it’s easy to focus on the sensational subject of malware, the truth is that mobile malware infections are incredibly uncommon in the real world. That’s thanks to both the nature of mobile malware and the inherent protections built into modern mobile operating systems.

The more realistic mobile security hazards lie in some easily overlooked areas, all of which are only expected to become more pressing in the coming year.

Data leakage

Data leakage is widely seen as being one of the most worrisome threats to enterprise security as we head into 2019. When it comes to a data breach, companies have a nearly 28% chance of experiencing at least one incident in the next two years, based on Ponemon’s latest research – odds of more than one in four, in other words.

Social engineering

The tried-and-true tactic of trickery is just as troubling on the mobile front as it is on desktop. Despite the ease with which one would think social engineering cons could be avoided, they remain astonishingly effective, with a staggering 91% of cyber crime starting with email.

Wi-Fi interference

A mobile device is only as secure as the network through which it transmits data. In an era where we’re all constantly connecting to public Wi-Fi networks, that means our information often isn’t as secure as we might assume.

Cryptojacking attacks

A relatively new addition to the list of relevant mobile threats, cryptojacking is a type of attack where someone uses a device to mine for cryptocurrency without the owner’s knowledge.

Physical device breaches

Last but not least is something that seems silly but remains a disturbingly realistic threat: A lost or unattended device can be a major security risk, especially if it doesn’t have a strong PIN or password and full data encryption.

Source: CSO Online