Data from Lookout shows a rise in credential theft mobile attacks against US government agencies | Techy Kings

[ad_1]

Almost 50% of phishing attacks against government employees in 2021 were aimed at stealing credentials, and in 2020 there were 30% of them.

SAN FRANCISCO, in 2022 November 2 /PRNewswire/ — Lookout, Inc., a cloud security endpoint company, today announced its 2022 government threat report, which examines the top mobile threats affecting federal, state, and local governments. United States. Lookout data reveals that from 2021 US government agencies are at risk of mobile phone fraud and device vulnerabilities. According to Lookout’s analysis of federal, state and local government data from the Lookout Security Graph, nearly 50% of phishing attacks have targeted the government. employees in 2021 sought to steal powers, and in 2020 there were 30 percent of them.

In addition to the increase in phishing attacks on government employees, the report’s findings include:

  • From 2020 until 2021 federal, state, and local governments increased their reliance on unmanaged mobile devices by 55 percent, indicating that BYOD will be aimed at supporting a greater remote workforce.
  • 1 in 8 government employees have faced fraud threats. With more than two million federal government employees alone, this represents a significant potential attack surface, as it only takes one successful phishing attempt to compromise the entire agency.
  • From 2020 until 2021 rates of state and local government fraud on mobile devices on both managed and unmanaged devices are steadily increasing, at 48% and 25%, respectively. This steady growth continued in the first half of 2022. half a year
  • Nearly 50% of Android users in state and local governments use outdated operating systems, exposing them to hundreds of device vulnerabilities. This is an improvement from 99% in 2020.

Government organizations store and transmit a variety of sensitive data, the security of which is essential to the well-being of hundreds of millions of people. When it comes to government organizations, a potential breach that results in leaked data, stolen credentials, or forced shutdowns due to ransomware can have a disproportionate impact compared to a typical cybersecurity incident.

In addition, government employees use iOS, Android, and ChromeOS devices every day to stay productive and increase efficiency. This makes them targets for cyber-attacks, as their devices act as a treasure trove of data and a gateway to government infrastructure. Only a modern endpoint security solution can detect mobile threats in applications, device operating systems and network connections, as well as protect against credential harvesting and phishing attacks. Due to the personal nature of smartphones, tablets, and Chromebooks, endpoint security must protect the user, the device, and the organization while respecting user privacy.

“It is more important than ever for government agencies to keep pace with the evolving cyber threat landscape,” he said. Tony D’Angelo, Vice President of American Public Sector at Lookout. “Whether or not devices are managed, protecting these modern endpoints requires a different approach—one that’s built for mobile from the ground up. Only a modern endpoint security solution can detect mobile threats across applications, device operating systems, and network connections. phishing attacks that steal credentials and deliver malware.

The Lookout Government Threat Report is based on analysis of federal, state and local government data from the Lookout Security Graph. Chart covering telemetry data from over 205 million devices and more than 175 million application analytics, enabled Lookout to identify and rank the top mobile threats agencies faced in 2021. and 2022 the first half of the year. Information used in this report. was compiled from de-identified, aggregated Lookout data.

Download 2022 Lookout’s government threat report here.

Additional resources:

About Lookout

Lookout, Inc. is a cloud security enterprise endpoint built for the intersection of enterprise and personal data. We protect data across devices, applications, networks and clouds with a unified cloud security platform, a solution that is as fluid and flexible as today’s digital world. By giving organizations and individuals greater control over their data, we enable them to unlock value and thrive. Businesses of all sizes, government agencies and millions of consumers trust Lookout to protect sensitive data so they can live, work and connect freely and securely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter.

Contact Lookout PR: [email protected]

© 2022 Lookout, Inc. LOOKOUT®, Lookout Shield Design®, LOOKOUT with Shield Design®, SCREAM® and SIGNAL FLARE® are registered trademarks of Lookout, Inc. brands United States and in other countries. EVERYTHING IS GOOD®, LOOKOUT MOBILE SECURITY® and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. brands. United States; and POST PERIMETER SECURITY ALLIANCE™ are Lookout, Inc. brand. All other trademarks and product names are trademarks or registered trademarks of their respective owners.

SOURCE Lookout



[ad_2]

Source link