Security School

Problem solve Get help with specific problems with your technologies, process and projects.

How best to find and fend off malicious mobile apps

Malicious mobile apps are now hackers' favorite tool to get to the data and networks you are trying to protect. Learn where the most dangerous threats are coming from and how best to counter them.


Mobile applications are hackers' favorite means, lately, to penetrating the enterprise security perimeter. Mobile apps on employee devices allow hackers to break into corporate systems from the "inside." In this Security School, expert Michael Cobb of Cobweb Applications Ltd. examines in depth the nature of the malicious mobile app threat and provides concrete, detailed advice on how best to counter it. An expert in data and system security, Cobb helps IT pros separate the real threat from the ones newspaper headlines scream about and then identifies both the established and emerging routes hackers are taking to ride on employee devices right into corporate systems. He then outlines in detail what IT infosec pros can do about it.

Watch the videos, listen to the podcast, read the tech tips then take the quiz to see how much you have learned about securing the network perimeter. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.



What are malicious mobile apps, and what can IT do about them?

Mobile applications are an increasingly attractive tool for hackers. By installing malicious mobile apps on the personal devices -- smart phones, tablets, laptaps -- that employees carry through corporate doors every day, bad actors can gain entrance to enterprise systems or even steal proprietary data off the devices themselves. The bring your own device movement has created a potential security hole that information security pros must understand and address. Watch Michael Cobb's initial webcast on malicious mobile apps to get up to speed on the basics of how hackers use them to get into your enterprise system. It explains what users and what types of data are hackers' favorite targets and provides actionable advice on plugging this latest, potentially dangerous hole in your security perimeter.


How to stop the malicious mobile apps aimed at your network

This presentation explains the threat from malicious mobile apps and how to neutralize it through rules, training and more. Continue Reading


The latest on malicious mobile apps

In this follow-up presentation, Michael Cobb brings viewers up to date on the latest developments in the mobile app world and how this technology is being employed by hackers to penetrate corporate systems ever more effectively. He considers threats from spyware and the use of jailbroken devices, but also provides expert advice on how information security pros can counter the threat with better training and a layered security strategy.


Malicious mobile apps are getting tougher to fight

Learn why enterprises must revise their defenses to keep mobile users and data safe, and where to concentrate your IT security budget. Continue Reading

3Tech Tip-

Are malicious mobile apps just a mere inconvenience?

In this technical tip, Michael Cobb considers the question of how dangerous the latest mobile malware really is to your enterprise system. He proposes an approach to separating fear-mongering news headlines from information that indicates you really should be concerned. There's no doubt that malicious mobile apps are a real threat, but with Cobb's help you will react more effectively, with a focus on the real danger to your system.


Are malicious mobile apps a mere inconvenience or a real threat?

How big a security threat are the malicious mobile apps riding into your enterprise on employees' mobile devices? Continue Reading

4Tech Tip-

Employee awareness is essential

In this tip, Cobb focuses on the essential element of an effective enterprise security strategy: user training. With so much business and personal data coexisting on employees' smart phones, tablets and laptops, any effort to protect the enterprise must start by making sure employees are aware of the threat. Only if they are aware of, for instance, how hackers try to trick them while they surf the Web or use a public Wi-Fi spot can employees do their part to uphold corporate security.


Mitigate malicious apps with mobile device security training

Mobile device security training can help reduce the threat of malicious mobile apps by making users think twice before clicking download. Continue Reading


Debunking myths about enterprise app stores

An in-house app store is an excellent way to help maintain information security in the BYOD era. In this podcast, Michael Cobb counters many popular myths about enterprise app stores and explain why they can be so effective and how to make sure your own store really performs (and why relying on the Apple app store is not a good strategy).


In-house app stores a handy weapon against malicious mobile apps

Michael Cobb explains why an enterprise in-house app store is an effective weapon against malicious mobile apps and dispels common misunderstandings against this means for securing employee devices and company data. Continue Reading


Show what you know about malicious mobile apps

With two tips, two webcasts and a podcast under your belt, you should be an expert now on the threat of malicious mobile apps and how to counter it. Take this quiz to be sure.

Take This Quiz

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.