Threatpost Poll: Is It Impossible to Secure Mobile Devices?

From spyware to leaky apps, mobile devices are facing a heightened level of threats. Are we prepared to secure them?

Between applications and operating systems, a slew of mobile threats continue to pop up – and when it comes to security, it’s getting harder and harder for enterprises to keep up.

Just in the past week, Apple patched a massive flaw in its FaceTime allowing a bad actor to eavesdrop on victims; while a malicious app that aimed to steal cryptocurrency from users was removed from Google’s official Android App Store.

Are enterprise companies prepared to take on this onslaught of security threats as the workforce becomes increasingly dependent on mobile devices? You can weigh in below with our Threatpost poll.

 

 

 

 

 

 

 

Interested in learning more about mobile enterprise security threats and best practices? Don’t miss our free Threatpost webinar on Feb. 27 at 2 p.m. ET. Join Threatpost senior editor Tara Seals and a panel of mobile security experts, including Patrick Hevesi of Gartner, to discuss the top evolving threats and risks that are unique to this work-from-anywhere environment; best practices for addressing them; and new challenges on the horizon, such as 5G services.

Suggested articles