Channels ▼


Study Points To Mobile Data Leak Risk

International IT governance body ISACA has released a study detailing the increasing potential for mobile devices to pose a significant threat to data loss. Pointing to information leakage over wireless and poorly secured wired networks, Securing Mobile Devices is intended as a wake-up call for companies who refuse to close backdoors leading to confidential enterprise information and intellectual property.

Recent discussion on anti-virus company AVG's corporate blogs has suggested that the reason we are still repeatedly discussing the same security issues over and over, is that obvious data threats are still not properly managed. Mobile devices are progressively more likely to be the target of a malware attack now than at any time in the past -- and as employees carry them beyond the protection of their company's network, the risk is multiplied exponentially.

According to the Michigan-based Ponemon Institute's Global 2009 Annual Study on the Cost of a Data Breach, 32 percent of all data breach cases analyzed involved lost or stolen laptop computers or other mobile data-bearing devices. While the average organizational cost of a data breach was $3.4 millionUS, all countries in the study reported noticeably higher data breach costs associated with mobile incidents.

"Ironically, many of the risks associated with mobile devices exist because of their biggest benefit: portability," said ISACA project development team member Mark Lobel.

ISACA recommends a governance framework such as COBIT or Risk IT to help IT managers ensure that process and policy changes are implemented and understood and that appropriate levels of security are applied to prevent data loss.

Related Reading

More Insights

Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.