4 Mobile Security Predictions In 2015

As we look ahead, mobility is the perfect breeding ground for attacks in 2015.

From JP Morgan to Home Depot to Sony, 2014 saw digital attacks that were unprecedented in both impact and sophistication. As we look ahead, mobility is the perfect breeding ground for attacks in 2015. We rely on mobile devices and apps more than ever. They are always connected and increasingly hold our most sensitive financial and personal information.

Here are four mobile security trends to watch in 2015:

Attackers will look to apps

With the emergence of Wirelurker and the Masque Attacks on iOS, app threats are no longer exclusive to Android. With organizations on high alert, we will see businesses embrace App Reputation Services and Mobile Threat Prevention solutions to go beyond identifying OS compromise to spot malicious and risky apps.

These solutions will continue to leverage enterprise mobility management (EMM) solutions to take action to mitigate malicious apps and devices, through quarantine and selective wipe.

Open WiFi will remain low-hanging fruit

As long as free WiFi exists, users will continue to use it, unaware of the risks. Enterprises that support mobile devices will adopt certificate-based authentication to provide mutual authentication and proactively deter interception and man-in-the-middle attacks.

Retailers will embrace Mobile POS

From a security perspective, 2014 was a tough year for some very prominent retailers. Attackers exploited vulnerabilities in legacy point-of-sale (POS) technology to the chagrin of retailers and consumers alike. With the deadline quickly approaching for merchants to meet PCI DSS 3.0 requirements by January 1, 2015, retailers now have another reason to fortify their deployments.

As retailers replace legacy POS terminals to support EMV, more and more will devote budget to mobile POS to improve the customer experience, offer line-busting, improve security, and save money. In addition, the PCI Council has stated “EMV is not a silver bullet” for preventing a breach. The PCI Council also recommends P2PE (Point-to-Point Encryption) and “device management services.”

The network edge will continue to blur

In 2015, organizations will begin incorporating mobile context into their security strategies. As mobile becomes ubiquitous, firewalls, IPS, malware protection systems, and other legacy technologies will not be equipped to protect corporate information in mobile environments.

Security organizations will need a better view into the security context of devices, apps, and mobile networks to automate security controls for protecting corporate data. As data increasingly exists on mobile devices and in the cloud, solutions that can secure and separate corporate clouds and personal clouds will gain traction.

The bottom line is that 2015 will see attackers focused more on mobile attacks. As a result, organizations will scramble to fortify their deployments. To quote Sun Tzu’s Art of War, “So in war, the way is to avoid what is strong and to strike at what is weak.” It will be important for organizations with mobile deployments to ensure their security strategy covers the weaknesses that remain in many deployments.

“The art of war teaches us to rely, not on the likelihood of the enemy’s not coming, but on our own readiness to receive him.” Ensure your defenses are up for 2015. The security technology exists and it’s time to embrace it.


  • The next time I read a weblog, I hope that it doesnt disappoint me as much as this one. I imply, I do know it was my choice to read, but I actually thought youd have something fascinating to say. All I hear is a bunch of whining about one thing that you may repair if you happen to werent too busy in search of attention.

  • Generally I don’t read post on blogs, but I would like to say that this write-up very forced me to try and do so! Your writing style has been amazed me. Thanks, quite nice post.

  • I’m extremely impressed with your writing skills and also with the layout on your weblog. Is this a paid theme or did you modify it yourself? Either way keep up the nice quality writing, it is rare to see a nice blog like this one today..

  • I am typically to blogging and i truly appreciate your content. The write-up has truly peaks my interest. I am going to bookmark your website and preserve checking for new data.

  • A lot of what you say is astonishingly accurate and it makes me wonder the reason why I hadn’t looked at this in this light before. Your article truly did turn the light on for me personally as far as this specific subject matter goes. Nevertheless at this time there is actually just one issue I am not necessarily too comfortable with and while I attempt to reconcile that with the main idea of the point, allow me observe exactly what all the rest of the visitors have to say.Nicely done.

Leave a Reply

Your email address will not be published. Required fields are marked *