SHARE
Facebook X Pinterest WhatsApp

Rapid App Development Creates Security Nightmare

Dec 30, 2015

Rapid App Development Creates an IT Security Nightmare

Rapid App Development Creates an IT Security NightmareRapid App Development Creates an IT Security Nightmare

The rapid rate of mobile app development has increased the risk of mobile breaches, as the creation of these apps is outpacing IT’s ability to secure them.

Majority of Organizations Have Mobility ProgramsMajority of Organizations Have Mobility Programs

Two-thirds organizations have BYOD, a corporate-owned personally-enabled (COPE) environment, or mix of these two approaches.

Corporate Data Is Accessible Through MobileCorporate Data Is Accessible Through Mobile

82% of respondents said most of their corporate data is accessible via mobile devices. 95% admit that a rise in data on or accessible by mobile increases the risk of a security breach.

Large Companies Recognize Risk the MostLarge Companies Recognize Risk the Most

Companies with more than 10,000 employees are more likely to admit that their organizations are significantly more at risk. “The greater the volume of employees and access to data, the greater the worry,” said a white paper summarizing the study.

Most Experience Data Breaches Due to Mobile SecurityMost Experience Data Breaches Due to Mobile Security

74% of respondents said that organizations have experienced the data breach because of a mobile security issue caused by: mobile apps containing malware, apps that contain security vulnerabilities, unsecured Wi-Fi connections

Concern About Malware in AppsConcern About Malware in Apps

73% of respondents are extremely or very concerned about apps that contain malware.

Concern About Apps Transmitting Sensitive DataConcern About Apps Transmitting Sensitive Data

66% of respondents are extremely or very concerned about apps that access or transmit sensitive data.

Mobile Apps Are Different From Traditional ApplicationsMobile Apps Are Different From Traditional Applications

The phenomenal pace of mobile app development—the Apple Store alone reached 1.5 million in June 2015, up 300,000 from last year—would have been unthinkable during the PC era.

App Vetting Is InsufficientApp Vetting Is Insufficient

The volume of apps is a challenge to mobile security solution providers, some of whom, such as Lookout, analyze 20,000 apps daily.

Mobile Devices at an Increased RiskMobile Devices at an Increased Risk

Mobile devices face more security risk than they did last year. 52% of respondents agree that there is somewhat more risk, 22% said there is significantly more risk, 21% said there is no greater risk, and 5% said their mobile devices face less risk.

Rise in Investments in Mobile SecurityRise in Investments in Mobile Security

90% of respondents are making increased mobile security investments a priority over the next year.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.