{"id":7289,"date":"2018-07-23T18:56:36","date_gmt":"2018-07-23T18:56:36","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541699"},"modified":"2018-07-23T18:56:36","modified_gmt":"2018-07-23T18:56:36","slug":"how-mobile-threats-impact-todays-byod-landscape","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/","title":{"rendered":"How mobile threats impact today\u2019s BYOD landscape"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog1.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity.<\/p>\n<p>At the same time, however, a worker who\u00a0uses his or her device to connect with sensitive, enterprise applications and data\u00a0could very easily put the business at risk. Without the right secure workflow processes and associated security protections, a single employee\u2019s smartphone could be all that hackers need to breach the entire organization.<\/p>\n<p>In the current environment, though, there\u2019s no turning back when it comes to BYOD. Prohibiting use of personal devices in the interest of data security can quickly lead to shadow IT, which can expose the organization, its systems and assets to an even wider array of threats.<\/p>\n<p>For these reasons, it\u2019s imperative that executives, IT leaders and individual staff members alike are aware of the risks that BYOD can pose, and are trained on the best ways to leverage this strategy with secure operations.<\/p>\n<h3>The state of BYOD: Too widespread to repeal<\/h3>\n<p>The very nature of mobile device use within today\u2019s society would make it nearly impossible to prevent their use within the business world.\u00a0Even mobile devices provided by enterprises can lead to security risks. This approach is also typically cost-prohibitive and a main reason why many businesses have embraced BYOD.<\/p>\n<table>\n<tbody readability=\"4.9021739130435\">\n<tr readability=\"9.804347826087\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Pew Research found that <a href=\"http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/\">95 percent of all Americans<\/a> own a mobile phone, 77 percent of which are smartphones.<\/li>\n<li>Mobile devices now represent the <a href=\"https:\/\/dynamicsignal.com\/2017\/10\/04\/14-employee-mobile-usage-statistics-company-cant-ignore\/\">primary\u00a0way users access the internet<\/a>, even surpassing desktop access, Dynamic Signal reported.<\/li>\n<li>Sixty percent of all employees use apps to complete work pursuits, and 90 percent of these users note that this activity has created a change in their professional behavior, according to Dynamics Signal.<\/li>\n<li>Seventy-one percent of employees spend two hours a week or more accessing enterprise information and assets via their mobile device, Dynamics Signal noted.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Despite attempts at rules to the contrary, even when businesses don\u2019t provide adequate resources for employees to leverage their mobile devices in meaningful ways, workers will seek out apps and other tools on their own. This can create dangerous shadow IT processes that heighten the enterprise\u2019s risk of attack, infection and data breach.<\/p>\n<p>The most optimal way forward in the current enterprise landscape is for leaders to fully accept and support BYOD within the business, and provide the necessary platforms, solutions, awareness and training to enable this strategy.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541700\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog.jpg\" alt=\"\" width=\"800\" height=\"420\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog-300x158.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog-768x403.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog-640x336.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog-440x231.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog-380x200.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>Trend Micro blocked millions of mobile threats from affecting businesses and consumers alike in 2017.<\/em><\/p>\n<h3>The current mobile threat landscape<\/h3>\n<p>First and foremost, it\u2019s imperative that business and IT leaders understand what they\u2019re up against when it comes to the current mobile threat environment. Awareness and identification of current threats will help decision-makers and IT teams craft protection deployments and usage policies that can thwart these issues specifically and better protect the organization\u2019s systems and assets.<\/p>\n<p>According to Trend Micro\u2019s recent research included in its <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/2017-mobile-threat-landscape\">2017 Mobile Threat Landscape report<\/a>, there are a few specific threats \u2013 including historically dangerous issues yet to be addressed by many enterprises, and emerging strategies growing in usage with cyber hackers \u2013 that business and IT leaders should be aware of.<\/p>\n<h3>Mobile ransomware<\/h3>\n<p>By now, most companies and users are aware of ransomware \u2013 robust attacks that involve encryption to lock users out of their operating systems, applications and data. These instances also include a ransom request which notes that users will be provided the decryption key and returned access to their data and systems upon payment. In many instances, organizations have paid attackers only to be met with a second ransom request or without ever being re-granted access to their system.<\/p>\n<p>When it first emerged, ransomware traditionally impacted desktops and spread throughout the network from there. Now, however, attackers have made the jump to mobile devices. In 2017 alone, mobile ransomware increased a whopping 415 percent compared to the previous year. Overall Trend Micro researchers identified more than 468,000 unique mobile ransomware samples last year.<\/p>\n<h3>Security vulnerabilities and exploits<\/h3>\n<p>Hackers are also leveraging identified security weaknesses in order to breach devices and provide a springboard for larger attacks.<\/p>\n<p>\u201cWhile operating systems are designed with security mechanisms in place, no platform is impervious \u2013 and mobile devices are no different,\u201d Trend Micro researchers explained in the 2017 Mobile Threat Landscape report. \u201cAdded mobile device features expose them to bigger security gaps with potentially greater impact.\u201d<\/p>\n<p>Last year also saw an increase in the number of these vulnerabilities and exploits, including the likes of BlueBorne, Key Reinstallation Attack (KRACK), Toast Overlay and Janus. BlueBorne alone \u2013 a combination of security flaws affecting\u00a0Bluetooth systems \u2013 impacted 5.3 billion devices.<\/p>\n<h3>Targeted attacks<\/h3>\n<p>Cyber attackers are also in the business of pinpointing and infecting or attacking a certain mobile device or group of devices specifically in order to further the goal of the hacking campaign they are a part of. For instance, Trend Micro\u2019s report noted that these activities can center around politicians or other government officials, members of the military, journalists, celebrities and other high-profile individuals. This can also include targeting the mobile devices of company leaders, which can then provide an opening for attacking the business itself.<\/p>\n<p>\u201cThese campaigns focus on stealing messages, contact lists, photos, audio and video files, as well as spying on calls, camera, and their target\u2019s social media,\u201d Trend Micro\u2019s report stated.<\/p>\n<p>Attacks of this nature increased considerably last year, particularly due to political tensions. Any type of targeted attack \u2013 including specifically those carried out through mobile platforms \u2013 pose a considerable danger to today\u2019s enterprises.<\/p>\n<h3>Security in the age of BYOD<\/h3>\n<p>While there is surely no turning back the page on BYOD, there are certain steps and strategies enterprises can use to bolster security surrounding the use of mobile devices for corporate purposes:<\/p>\n<table>\n<tbody readability=\"4.5\">\n<tr readability=\"9\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li><strong>Embrace it with a robust BYOD policy:<\/strong> Organizational and IT leaders should craft a strong BYOD policy that explains users\u2019 responsibilities, the protections that must be in place and the standards they must observe in order to ensure security. Companies that are more visible and supportive when it comes to BYOD can better reduce the chances of shadow IT, which can cause more threats and damage.<\/li>\n<li><strong>Understand the threat environment:<\/strong> As Trend Micro\u2019s report shows, hackers are taking advantage of identified and unpatched security vulnerabilities within mobile devices to support their attacks. When business and IT leaders are aware of these potential weaknesses, they can work to specifically guard against their malicious use within their own infrastructures.<\/li>\n<li><strong>Leverage strong security solutions:<\/strong> This includes both at the network- and device-level.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Trend Micro successfully blocked more than 58 million mobile threats in 2017 alone.\u00a0Connect with us today to find out how we can help you safeguard your business\u2019s BYOD activity.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/how-mobile-threats-impact-todays-byod-landscape\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,&#8230;<br \/>\nThe post How mobile threats impact today&#8217;s BYOD landscape appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7290,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1859,29,2217,307,1196],"class_list":["post-7289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-data-security","tag-mobile-security","tag-mobile-threat-landscape","tag-security","tag-targeted-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How mobile threats impact today\u2019s BYOD landscape 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How mobile threats impact today\u2019s BYOD landscape 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-23T18:56:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/how-mobile-threats-impact-todays-byod-landscape.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How mobile threats impact today\u2019s BYOD landscape\",\"datePublished\":\"2018-07-23T18:56:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/how-mobile-threats-impact-todays-byod-landscape.jpg\",\"keywords\":[\"data security\",\"Mobile Security\",\"Mobile Threat Landscape\",\"Security\",\"targeted attack\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/\",\"name\":\"How mobile threats impact today\u2019s BYOD landscape 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/how-mobile-threats-impact-todays-byod-landscape.jpg\",\"datePublished\":\"2018-07-23T18:56:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/how-mobile-threats-impact-todays-byod-landscape.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/how-mobile-threats-impact-todays-byod-landscape.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-mobile-threats-impact-todays-byod-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"data security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/data-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How mobile threats impact today\u2019s BYOD landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How mobile threats impact today\u2019s BYOD landscape 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/","og_locale":"en_US","og_type":"article","og_title":"How mobile threats impact today\u2019s BYOD landscape 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-23T18:56:36+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/how-mobile-threats-impact-todays-byod-landscape.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How mobile threats impact today\u2019s BYOD landscape","datePublished":"2018-07-23T18:56:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/"},"wordCount":1157,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/how-mobile-threats-impact-todays-byod-landscape.jpg","keywords":["data security","Mobile Security","Mobile Threat Landscape","Security","targeted attack"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/","url":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/","name":"How mobile threats impact today\u2019s BYOD landscape 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/how-mobile-threats-impact-todays-byod-landscape.jpg","datePublished":"2018-07-23T18:56:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/how-mobile-threats-impact-todays-byod-landscape.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/how-mobile-threats-impact-todays-byod-landscape.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-mobile-threats-impact-todays-byod-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"data security","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-security\/"},{"@type":"ListItem","position":3,"name":"How mobile threats impact today\u2019s BYOD landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=7289"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/7290"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=7289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=7289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=7289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}