The Overlooked Threat: Why Mobile Devices Are Your Weakest Link
It’s not the phone - it’s the person. Learn how human behavior becomes the gateway to mobile breaches
Topic
Awareness / Phishing / FraudEndpoint ProtectionMobile Security
When & Where
Details
Format:
Lecture
Language:
English
Session description
Employees rely on iOS and Android devices for authentication, communication, and productivity, often while working remotely. As cyberattacks on mobile devices continue to increase, threat actors are shifting their focus from systems to people, exploiting human instincts such as trust, curiosity, and urgency to bypass traditional security defenses. Lookout research reveals the Tactics, Techniques, and Procedures (TTPs) used to manipulate users and breach enterprise environments through mobile endpoints.
Join Michael Simpson, Senior Solution Engineer at Lookout, for a real-world look at the threats targeting your mobile fleet and what you can do about them:
- A day in the life of your mobile device and where to spot the attacks
- How mob ...
Join Michael Simpson, Senior Solution Engineer at Lookout, for a real-world look at the threats targeting your mobile fleet and what you can do about them:
- A day in the life of your mobile device and where to spot the attacks
- How mob ...