SHARE
Facebook X Pinterest WhatsApp

The Eight Riskiest Mobile Devices In Need of Protection

The Eight Riskiest Mobile Devices In Need of Protection Android DevicesAndroid’s open source software is something that gives the platform great appeal, but it is also the basis of its vulnerability. Users may enjoy the freedom to acquire apps both inside and outside the Android Market, but it doesn’t come without risk. –Troy Gill, security […]

Oct 24, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1The Eight Riskiest Mobile Devices In Need of Protection

Android DevicesAndroid’s open source software is something that gives the platform great appeal, but it is also the basis of its vulnerability. Users may enjoy the freedom to acquire apps both inside and outside the Android Market, but it doesn’t come without risk. –Troy Gill, security analyst for AppRiver

2No Title

Symbian DevicesMost of the recent mobile malware has focused on Android and Symbian devices. Mobile-targeted malware is rising steadily. Cybercriminals are opportunistic and flock to systems and platforms that offer low security barriers coupled with a high potential for reward. Mobile is a prime target.–Amit Sinha, CTO of Zscaler

3No Title

iPadsiPads pose the worst risk as far as data leakage in concerned since they are mainly used for consumption of enterprise information in various form of documents. This sensitive info is not properly encrypted, and is rarely confined to the device– it can be easily forwarded to a private account and out of the control of the enterprise.–Guy Levy-Yurista, vice president of product and development for AirPatrol, Inc.

4No Title

Blackberry DevicesBlackberry (service’s) publicized frequent outages may not affect security, per se, but does compromise productivity. Furthermore, (Research in Motion) has discovered that vulnerabilities exist in how the BlackBerry MDS Connection Service and the BlackBerry Messaging Agent process PNG and TIFF images for rendering on the BlackBerry smartphone.–Nathan J. Lugo-Montanez, consultant for Deft Security Consultants

5No Title

Jailbroken SmartphonesA mobile device that has been jailbroken is one that’s had its safety net removed. The makers of these devices are doing the best job of making truly safe systems, and jail breaking them makes them vulnerable.–Jon Callas, CTO for Entrust

6No Title

LaptopsClearly the most targeted mobile device is still the laptop itself. Almost a full quarter of all the records reported breached by Health and Human Services under the HITECH Act are as a result of lost or stolen laptops. -Geoff Webb, senior product marketing manager for Credant Technologies

7No Title

USB Thumb DriveHumble thumb drive(s) are so ubiquitous we rarely give them any thought at all, yet with storage capacities in the tens of gigabytes they are a major problem. There have been a number of very significant breaches in the headlines this year as a result of thumb drives carrying unencrypted information being lost or stolen, and those are only the cases that are discovered and reported.–Geoff Webb, senior product marketing manager for Credant Technologies

8No Title

Anything running Flash or PDFvAnything running Flash or PDF. While Windows may be the most hacked OS, the primary vectors for hacking Windows has been through PDF or Flash. They are the holes in the safety net. Microsoft has assiduously updated their system, but these content delivery systems remain the largest vulnerability on any OS. –Jon Callas, CTO for Entrust

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.