Skip to main content

Where Is Your Company Data Going?

5 common risks your employees face in today’s mobile workplace

In today’s mobile workplace, it is vital for IT to keep up with ever changing security threats. As hard as you try, mitigating security risks across the various places employees work has been virtually impossible.

Until now.

Stats on mobility

55% of surveyed CIOs see the “anywhere” workplace as one of the biggest trends set to transform the business arena.1

71% of those same CIOs see mobile solutions as the technology most likely to revolutionize business.1

Mobility poses greater risks and puts more pressure on you and your team to keep up with the evolving security landscape.

A security breach can cost your organization big.

99 daysAverage length of time attackers are present on a network before detection.2

$9.5MGlobal average annual cost of cybercrime for individual organizations.3

Potential impacts
to your organization

39%

Information loss

36%

Business disruption

20%

Revenue loss


4%

Equipment damages

1%

Other costs

Common threats

Despite the risks, you’re tasked with enabling secure mobility for your organization. Be prepared to thwart security threats when taking a workforce mobile.

Learn about the most common security threats for your data. Select a scenario to see how you can prepare to defend against security threats.

Chair-to-keyboard
errors

No matter your work flow, devices spend the most time in the office. That’s not to say they’re free from security risks.User error can contribute to network breaches, but the right hardware can protect your data from a variety of careless mishaps.

Icon indicating click for more informationREAD MORE

Hackers love public
Wi-Fi networks

Public Wi-Fi networks are both a blessing and a curse. While employees might be more productive working from a cafe, public networks make easy entry points into company devices.

Icon indicating click for more informationREAD MORE

Home sweet
(unprotected) home

Deadlines, the flu, and convenience drives end users at every level of the organization to take their work home with them. Without strict network security measures, sensitive information could be left unprotected. The right hardware solution can bolster security measures, no matter which network employees connect to.

Icon indicating click for more informationREAD MORE

Beware of the
uninvited guest

Sensitive conversations can be just as damaging as internal emails, and you never know who might be listening in. Protect your company’s data and their clients with high-tech hardware that can disable possible entry points into your network.

Icon indicating click for more informationREAD MORE

The ultimate threat:
Lost or stolen
devices

Whether lost or stolen, a device in the hands of a hacker is in serious risk. Device memory and network connections can lead to valuable information leaks. But this is where premium hardware shines. With the right technology behind you, you have multiple safeguards against intruders.

Icon indicating click for more informationREAD MORE

Despite multiple opportunities for threats in various locations, your company’s data is safeguarded through best-in-class security protections built into the device—and all with minimal additional effort from your IT team or your employees.

Empower your mobile workforce, without compromising security. Learn how to best introduce new hardware and how the Surface portfolio of products can securely meet your organization’s needs with our eBook, Roll Out New Tech Like a Pro: 4 tips for implementing a successful and secure hardware solution.

microsoft logo
Sources
  • 1 “Redefining Connections: Insights from the Global C-Suite Study—The CIO Perspective,” 2016, IBM

  • 2 “M-Trends 2017: A View From the Front Lines,” 2017, FireEye

  • 3 “2016 Cost of Cyber Crime Study & the Risk of Business Innovation,” 2016, Ponemon Institute

CLOSE
Person sitting at a computer desk

Chair-to-keyboard errors

The office may be the safest place for company devices, but it’s not risk-free. User error is often the biggest threat in otherwise secured environments.

THREAT WARNING

A new phishing attack has found its way to an unsuspecting employee. Now, a hacker is attempting to use those credentials to gain access to your network. Considering most people reuse passwords, company-sensitive files are at risk.

3.3B
credentials reportedly stolen in 2016.4

$95,821
Average annual cost of phishing and social engineering attacks in 2016, when weighted by attack frequency—up 11% from 2015.5

ATTACK THWARTED

Passwords are among the most vulnerable entry points to your organization’s network, mostly due to poor password habits. Devices that use dual-authentication with biometric features allow employees to sign in without entering an alphanumeric password.

HOW THIS WORKS

Biometric authentications rely on unique user identification features—such as fingerprint scanning and facial recognition—to add an additional layer of security. When paired with hardware equipped with infrared cameras capable of utilizing these security features, device and network security is increased.

Storing biometric logins on the device better protects your company’s data. It prevents the data from being housed in a potentially vulnerable location and doesn’t provide a single place for an attacker to gain access to all your organization’s credentials.

Despite the threat, your company’s data is safeguarded through best-in-class security protection built into the device—and with minimal additional effort from your IT team or employees.

Looking for a secured solution? Download our guide to learn how to roll out new hardware like a pro.

Download

4 “2017 Credential Spill Report,” 2017, Shape

5 “2016 Cost of Cyber Crime Study & the Risk of Business Innovation,” 2016, Ponemon Institute

CLOSE
Two people in a coffe shop

Hackers love public Wi-Fi networks

Employees frequently meet in cafes to collaborate with colleagues or take client meetings and will connect to free (but vulnerable) public Wi-Fi networks.

THREAT WARNING

An employee mistakenly connects to a man-in-the-middle network, and a hacker attempts to place malware on the device’s operating system.

54%
of enterprises’ mobile attacks have been network attacks through malicious Wi-Fi connections.6

98%
of surveyed companies experienced a malware attack in 2016.7

ATTACK THWARTED

Because you purchased secured hardware that supports enhanced virtualization-based Windows security features, hackers cannot place malware in the kernel and can’t do any significant damage.

HOW THIS WORKS

Additional security features ensure only known code runs on devices, preventing malicious codes from doing any damage.

Should an attacker gain access, software- and hardware-enforced security features provide a hypervisor-restricted, specialized subsystem for storing, securing, transferring, and using sensitive data. The operating system’s kernel is run in this subsystem, making it difficult for hackers to make unwanted changes.

Despite the threat, your company’s data is safeguarded through best-in-class security protection built into the device—and with minimal additional effort from your IT team or employees.

Enable mobility across your organization without compromising security. Download our eBook to learn how to roll out new hardware like a pro.

Download

6 “The Growing Threat of Mobile Device Security Breaches,” 2017, Dimensional Research

7 “2016 Cost of Cyber Crime Study & the Risk of Business Innovation,” 2016, Ponemon Institute

CLOSE
Two people in a coffe shop

Home sweet (unprotected) home

Employees expect access from home on their company devices. Whether feeling unwell or taking the day to focus, employees require their devices to adapt to their needs.

THREAT WARNING

Without network safeguards in place, at-home Wi-Fi puts company data at risk. But work flexibility is high on employees’ list of priorities.

37%
of surveyed employees would change jobs if it provided the flexibility to work from anywhere at least part of the time.8

ATTACK THWARTED

Despite a less secure in-home network, you enabled the device’s various levels of encryptions to help protect it from malware and other potential threats.

HOW THIS WORKS

Not only is the data encrypted, but it’s also FIPS 140-2, Common Criteria, and CSfC-certified—meaning the device’s government-level encryption helps protect sensitive data from falling into the wrong hands.

The hardware meets security and interoperability requirements consistent with the DISA Field Security Office (FSO) Security Technical Implementation Guides (STIG).

Despite the threat, your company’s data is safeguarded through best-in-class security protection built into the device—and with minimal additional effort from your IT team or employees.

Government-level security isn’t hard to get. Learn how to deliver premium devices to your entire organization with our eBook.

Download

8 “State of the American Workplace Report,” 2017, Gallup

CLOSE
Two people in a coffe shop

Beware of the uninvited guest

Sometimes client meetings contain highly sensitive information—so much so that built-in peripherals, such as cameras, microphones, and various ports, can cause serious security risks.

THREAT WARNING

An unknowing employee walks into a confidential meeting with a compromised device. After successfully gaining access to the device, the attacker attempts to enable the microphone, listen in, and gather intel.

24%
of security professionals don’t know whether they have experienced an attack, and 20% have been breached.9

ATTACK THWARTED

Despite the devices’ existing peripherals, the hacker simply can’t gain access to listen in. You prevented the attack by disabling the microphone and video features with the help of customizable firmware settings.

HOW THIS WORKS

The system uses digital signatures and certificates to manage configurations to the firmware, preventing employees from re-enabling peripherals on devices that shouldn't have access.

Despite the threat, your company’s data is safeguarded through best-in-class security protection built into the device—and with minimal additional effort from your IT team or employees.

Protect sensitive information with secured hardware. Discover how to select the best hardware for your company with our latest guide.

Download

9 “The Growing Threat of Mobile Device Security Breaches,” 2017, Dimensional Research

CLOSE
Person sitting at a computer desk

The ultimate threat: Lost or stolen devices

Although easier to identify than covert attacks, nothing is more threatening than a hacker having physical possession of a company device.

THREAT WARNING

Not able to simply sign on to steal the device’s data (thanks to the dual-factor identification protections), the hacker resorts to circumventing the operating system controls by running another operating system to access memory.

47%
of U.S. enterprises have at least one missing device.10

ATTACK THWARTED

With advanced device encryption enabled by ideal hardware and software pairing, the hacker can’t access information from the device.

HOW THIS WORKS

An advanced encryption tool can encrypt entire drives and protect encryption keys from cold boot attacks. Encryption tools work best with computers that run a Trusted Platform Module (TPM) and have a Trusted Computing Group (TCG)–compliant BIOS or UEFI firmware.

Despite the threat, your company’s data is safeguarded through best-in-class security protection built into the device—and with minimal additional effort from your IT team or employees.

Built-in security features take your hardware to the next level. For more information on selecting premium hardware, read our guide for rolling out new tech like a pro.

Download

10 “Mobile Security and Risk Review,” 2016, MobileIron