{"id":35224,"date":"2020-05-28T12:00:08","date_gmt":"2020-05-28T12:00:08","guid":{"rendered":"http:\/\/fd7a3f9a-7a8e-4d0f-832e-260ee0e1cf95"},"modified":"2020-05-28T12:00:08","modified_gmt":"2020-05-28T12:00:08","slug":"cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/","title":{"rendered":"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks"},"content":{"rendered":"<p>Whilst staff tend to stick to the rules imposed by the business, many in more senior roles ask for relaxed mobile security protocols<\/p>\n<p>New research released today from London-based security platform MobileIron has revealed that the C-suite is the most likely group within an organization to ask for relaxed mobile security protocols, despite this group also being highly targeted by malicious cyber attacks.<strong>&nbsp;<\/strong><\/p>\n<p>Its &#8220;<a href=\"https:\/\/www.mobileiron.com\/en\/resources-library\/whitepapers\/trouble-at-the-top\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Trouble at the Top<\/a>&#8221; study combined research from 300 enterprise IT decision-makers across Benelux, France, Germany, UK, and the US, as well as 50 C-level executives from the UK and the US.<\/p>\n<p>The study showed that over two-thirds (68%) of C-level executives said IT security compromises their personal privacy, and over three in five (62%) said that security limits the usability of their device. Almost three in five (58%) claimed that IT security is too complex to understand.&nbsp;<\/p>\n<p>Over three in four (76%) C-level executives admitted requesting to bypass one or more of their organization&#8217;s security protocols last year.<\/p>\n<p>Of these, 47% requested network access to an unsupported device, 45% requested to bypass multi-factor authentication (MFA), and 37% requested access to business data on an unsupported app.<\/p>\n<p>One in six (16%) have requested to bypass one of the organization&#8217;s security protocols over five times, and 14% have made the same request 4-5 times.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/27\/b7e5ccb5-7857-4dce-a07f-d84d20063114\/cxo-cyberattack-bypass-mobileiron-eileen-brown-zdnet.png\" class alt=\"CXOs are the weakest link in mobile device security\"><\/span> <span class=\"credit\">MobileIron<\/span><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The study also revealed that C-level execs are highly vulnerable to cyber attacks. Almost four in five (78%) of IT decision-makers stated that the C-suite is the most likely to be targeted by phishing attacks, and 71% claimed the C-suite is the most likely to fall victim to such attacks.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/cxos-are-the-weakest-link-in-mobile-device-security-and-most-likely-to-suffer-cyber-attacks\/\" class=\"lazy\" alt=\"CXOs are the weakest link in mobile device security\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/27\/e4d7d2e0-dbc2-459c-bebd-3a6663fef079\/cxo-cyberattack-mobileiron-eileen-brown-zdnet.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/27\/e4d7d2e0-dbc2-459c-bebd-3a6663fef079\/cxo-cyberattack-mobileiron-eileen-brown-zdnet.png\" class alt=\"CXOs are the weakest link in mobile device security\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">MobileIron<\/span><\/p>\n<p>Almost three in four (72%) IT decision-makers also claimed the C-suite is the most likely to forget or need help with resetting their passwords.<\/p>\n<p>Brian Foster, SVP Product Management, MobileIron said:&nbsp;<\/p>\n<blockquote readability=\"15\">\n<p>&#8220;These findings are concerning because all of these C-suite exemptions drastically increase the risk of a data breach.<\/p>\n<p>Accessing business data on a personal device or app takes data outside of the protected environment, leaving critical business information exposed for malicious users to take advantage of.<\/p>\n<p>Meanwhile, MFA &#8212; designed to protect businesses from the leading cause of data breaches, stolen credentials &#8212; is being side-stepped by C-Suite execs.&#8221;<\/p>\n<\/blockquote>\n<p>The C-suite is the most likely group within an organization to ask for relaxed mobile security protocols (74%) &#8212; despite also being highly targeted by malicious cyber attacks.<\/p>\n<p>These findings are concerning because all of these C-suite exemptions could drastically increase the risk of a data breach. By relaxing security protocols, the C-suite are opening themselves up to phishing attacks and potentially costing their businesses millions.<\/p>\n<p>If IT views the C-suite as the weak link when it comes to cybersecurity, then executives need to make sure they adhere to IT policies. However, execs often see themselves as above security protocols creating tension between business leaders and IT departments.<\/p>\n<p>Cybersecurity is necessary to prevent attacks, and cannot be seen as an optional extra by the people who make the decisions about the business.<\/p>\n<h3>Previous and related coverage<\/h3>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/surveillance-cameras-are-top-home-security-feature-installed-after-consuming-true-crime-content\/\">Surveillance cameras are top home security feature installed after consuming true crime content<\/a><\/h5>\n<p>Over one in five Americans feel more worried for their safety after consuming true crime content.<\/p>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/enterprises-are-getting-more-high-risk-calls-as-fraudsters-exploit-covid-19\/\">Enterprises are getting more high-risk calls as fraudsters exploit COVID-19<\/a><\/h5>\n<p>Americans are being impacted by this fraud-filled crisis as bad actor activity escalates.<\/p>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/most-consumers-admit-to-sharing-passwords-with-someone-outside-their-home\/\">Most consumers admit to sharing passwords with someone outside their home<\/a><\/h5>\n<p>Although Americans worry about their devices being hacked, most are happy to share their passwords.<\/p>\n<h5><a href=\"https:\/\/www.zdnet.com\/article\/one-in-four-americans-wont-do-business-with-data-breached-companies\/\">One in four Americans won&#8217;t do business with data-breached companies<\/a><\/h5>\n<p>With so many large-scale data breaches at major companies, is it possible for brands to regain consumer confidence again?<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cxos-are-the-weakest-link-in-mobile-device-security\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new study by MobileIron reveals that C-level executives feel frustrated by mobile security protocols and often request to bypass them.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35225,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-35224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-28T12:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"827\" \/>\n\t<meta property=\"og:image:height\" content=\"469\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks\",\"datePublished\":\"2020-05-28T12:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/\",\"name\":\"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png\",\"datePublished\":\"2020-05-28T12:00:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png\",\"width\":827,\"height\":469},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-28T12:00:08+00:00","og_image":[{"width":827,"height":469,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks","datePublished":"2020-05-28T12:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/"},"wordCount":622,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/","name":"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png","datePublished":"2020-05-28T12:00:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks.png","width":827,"height":469},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cxos-are-the-weakest-link-in-mobile-device-security-but-most-likely-to-suffer-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CXOs are the weakest link in mobile device security but most likely to suffer cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35224"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35225"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}