The majority of respondents scan QR codes despite the security risks
MobileIron, (NASDAQ: MOBL), the mobile-centric security platform for the Everywhere Enterprise, presented the results of new research on consumer sentiment, (NASDAQ: MOBL), the mobile-centric security platform for the Everywhere Enterprise, presented the results of new research on
, (NASDAQ: MOBL), the mobile-centric security platform for the Everywhere Enterprise, presented the results of new research on
Employees currently use mobile devices most of the time - in many cases, their own (unsafe) devices - to connect with others, interact with a variety of cloud applications and services, and stay productive while working in places other than the company. Users are also using their mobile devices to scan QR codes outside of work, putting themselves and company assets at risk.
Employees currently use mobile devices most of the time - in many cases, their own (unsafe) devices - to connect with others, interact with a variety of cloud applications and services, and stay productive while working in places other than the company. Users are also using their mobile devices to scan QR codes outside of work, putting themselves and company assets at risk.
- 84% of people have already scanned a QR code in the past, 32% in the last week and 26% in the last month.
- 84% of people have already scanned a QR code in the past, 32% in the last week and 26% in the last month.
- 84% of people have already scanned a QR code in the past, 32% in the last week and 26% in the last month.
- 84% of people have already scanned a QR code in the past, 32% in the last week and 26% in the last month.
- 84% of people have already scanned a QR code in the past, 32% in the last week and 26% in the last month.
Hackers are also exploiting the security vulnerabilities that inevitably opened up during the COVID-19 pandemic, in recent times they are targeting mobile devices with increasingly sophisticated attacks. Mobile devices are attractive targets for them because the interface itself prompts users to take immediate action, while limiting the amount of information available. Additionally, users are often distracted when operating from their mobile devices, which makes them more likely to fall victim to attacks.
Hackers are also exploiting the security vulnerabilities that inevitably opened up during the COVID-19 pandemic, in recent times they are targeting mobile devices with increasingly sophisticated attacks. Mobile devices are attractive targets for them because the interface itself prompts users to take immediate action, while limiting the amount of information available. Additionally, users are often distracted when operating from their mobile devices, which makes them more likely to fall victim to attacks. Alex Mosher, Global Vice President of Solutions di MobileIron Alex Mosher, Global Vice President of Solutions di MobileIron
Alex Mosher, Global Vice President of Solutions di MobileIron
- Nearly three-quarters (71%) of respondents are unable to distinguish between a legitimate and malicious QR code, while 67% of respondents are able to distinguish between a legitimate and a malicious URL.
- Nearly three-quarters (71%) of respondents are unable to distinguish between a legitimate and malicious QR code, while 67% of respondents are able to distinguish between a legitimate and a malicious URL.
- Nearly three-quarters (71%) of respondents are unable to distinguish between a legitimate and malicious QR code, while 67% of respondents are able to distinguish between a legitimate and a malicious URL.
- 51% of respondents have concerns about the use of QR codes for privacy, security, financial or other matters, but use them anyway; 34% do not worry about the use of QR codes.
- 51% of respondents have concerns about the use of QR codes for privacy, security, financial or other matters, but use them anyway; 34% do not worry about the use of QR codes.
51% of respondents have concerns about the use of QR codes for privacy, security, financial or other matters, but use them anyway; 34% do not worry about the use of QR codes. Mosher. "At the same time, they must prioritize a seamless user experience. Unified endpoint management can provide the IT controls needed to secure, manage and monitor every device, user, app and network used to access corporate data, while maximizing productivity. They can also rely on UEM which defends against threats to devices which is very useful for quickly detecting and correcting them, including malicious QR codes, even when a device is offline ”.
MobileIron Threat Defense can protect devices from attacks at the device, network, and application levels. And no action is required by the end user to distribute MTD on devices that are enrolled in the MobileIron UEM client; this is managed remotely by the IT departments.
can protect devices from attacks at the device, network, and application levels. And no action is required by the end user to distribute MTD on devices that are enrolled in the MobileIron UEM client; this is managed remotely by the IT departments.
can protect devices from attacks at the device, network, and application levels. And no action is required by the end user to distribute MTD on devices that are enrolled in the MobileIron UEM client; this is managed remotely by the IT departments. to consult on the site.