Sheer iOS traffic is making Apple the lowest hanging fruit, Zscaler's State of the Web Report finds Apple devices — ever more popular in the workplace — are about to become more popular with cyber criminals.That is one of a number of findings in security vendor Zscaler’s Q1 State of the Web Report that should be unsettling to enterprises that permit employees to “bring your own device,” or BYOD.The biggest mobile targets of malware so far have been devices powered by Android, since it is in the widest use and is an open platform.But that may change soon. Zscaler’s report said in a survey covering 200 billion transactions, Apple iOS web traffic jumped from 40% in the last quarter of 2011 to 48% in the first quarter of 2012, surpassing Android, which dropped to 37%. More iOS traffic means more Apple devices in use at enterprises, which is likely to make them more attractive to cyber criminals.[See also: Companies slow to react to mobile security threat] And a significant majority of enterprises allow BYOD: A survey released in April by the SANS Institute found that 61% of more than 500 companies surveyed allowed BYOD. A press release announcing the survey included as part of its headline: “Lack of awareness, chaos pervades with BYOD.”The so-called “consumerization of IT” is an apparently unstoppable trend. And most businesses don’t want to stop it, because of the advantages that collaboration and social networking with mobile devices can bring to the enterprise. Still, increasing security threats could undermine those advantages.Blake Turrentine, CEO of HotWAN and trainer at Black Hat, has been a penetration tester for more than 12 years. His continuing mantra is, “most everything you do on a smartphone can and may be monitored,” although he does qualify that by saying he believes Apple iOS devices that are kept up to date with the latest firmware are relatively secure.Rachel Ratcliff Womack, a vice president with the digital security firm Stroz Friedberg, told The Bottom Line‘s Herb Weisbaum on MSNBC that most people carry both business and personal information on their mobile devices. “It brings those two worlds together in a very convenient package for criminals to target,” she said.And the damage malware can do is the same as on other devices: steal personal information, drain bank accounts and spy on users.“[Yet] users may view these devices as eminently secure, when in reality they are just waiting to receive more attention from cyber criminals,” James Lyne, director of technology strategies at the online security firm Sophos, told Weisbaum. In the face of these impending threats, multiple security surveys find both employees and employers appear to be relatively blase about them. SANS reported that only 9% of companies participating in its survey said they were “fully aware” of all the devices accessing their networks. Another 50% were “vaguely or fairly” aware. Nearly a third of the companies said they had no management policy for employee mobile devices.Some of this may be inevitable. Turrentine says he doubts that enterprises can control their employees’ personal devices. “Users control their own phones,” he says, acknowledging that this is “a big [security] hole.” The proliferation of smartphones, alone with their ever-expanding capabilities means “the attack surface is expanded,” he says, noting that Apple devices are prized because of their cutting-edge functionality.And he agrees that security is not the priority it should be at all levels — users, enterprise leaders and the manufacturers themselves. The pressure on the makers of devices is not for better security but more functionality. “They’re racing so fast to come up with more capabilities, because the mobile market is changing so rapidly,” he says.Meanwhile, Mike Geide, senior researcher at Zscaler ThreatlabZ tells Network World that employees regularly try to bypass their companies’ security policies, even using anonymous proxy servers to get to unauthorized web sites. Turrentine says even relatively savvy smartphone users seem blissfully unaware of the ways they are exposing their confidential information. He says he visited a Verizon kiosk in a shopping mall and talked to some of the workers there who were doing things like, “downloading questionable third-party apps and also doing online banking.”The good news, he and others say, is that a solution is not terribly complicated. The best thing users can do is to make sure they have the latest versions of apps and the operating system of their device. Turrentine says the latest iOS is fairly secure, noting that it took the jailbreak community 10 months to break the iPad 2.Beyond that, Lyne tells The Bottom Line that users should have a robust password, use encryption, and be very careful about what apps they install.“Think before you download,” he says. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe