{"id":78678,"date":"2024-05-30T16:54:41","date_gmt":"2024-05-30T08:54:41","guid":{"rendered":"https:\/\/version-2.com\/?p=78678"},"modified":"2024-05-28T17:04:49","modified_gmt":"2024-05-28T09:04:49","slug":"armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/05\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/","title":{"rendered":"Armor your Achilles\u2019 heel. Reduce your business&#8217; attack surface vectoring from employee mobile devices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78678\" class=\"elementor elementor-78678\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div class=\"meta\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/div><div id=\"content-c10647589\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>The number of Android threats detected by ESET telemetry in the past four years has tripled.\u00a0 <\/em><\/p><p>Trojanized<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps\/\" target=\"_blank\" rel=\"noopener\"> chat apps<\/a>, software development kits <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2023\/\" target=\"_blank\" rel=\"noopener\">turning legitimate apps into spyware<\/a>, or <a href=\"https:\/\/www.welivesecurity.com\/2023\/06\/15\/android-gravityrat-goes-after-whatsapp-backups\/\" target=\"_blank\" rel=\"noopener\">fake websites<\/a> offering malicious mobile applications \u2014 these are just a handful of the <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2023\/\" target=\"_blank\" rel=\"noopener\">growing number <\/a>of threats targeting smartphone users in the past few months discovered and analyzed by ESET researchers.<\/p><p>While these threats may sound like the personal problems of private individuals using their own devices, <a href=\"https:\/\/www.statista.com\/statistics\/1147849\/share-adults-worldwide-employer-issued-device-personal-activities\/\" target=\"_blank\" rel=\"noopener\">various surveys<\/a> show that smartphone equipped rank-and-file employees are in fact yet another attack surface for businesses, one that should be prioritized.\u00a0<\/p><p>And that\u2019s not easy. Even with thorough cyber-awareness training, there is still a good chance that an employee will fall victim to a sophisticated attack and become the Achilles\u2019 heel in an otherwise first-rate defense of their respective business.<\/p><p>Being aware of this, ESET has introduced a new Mobile Threat Defense module to its comprehensive business solution ESET PROTECT, with sweet pricing available for the Advanced tier and higher. Users of ESET PROTECT Advanced and higher can enjoy one free mobile device seat per one paid seat for other devices.\u00a0<\/p><\/div><div id=\"content-c10647590\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Growing numbers<\/h3><\/header><p>To understand the scope of the problem, let\u2019s review some key data from ESET telemetry. From the beginning of 2020 until the end of 2023, detections of Android malware rose by 222%. ESET Threat Reports provide further insight as to why this number has more than tripled in just four years.<\/p><p>In 2021, ESET telemetry detected a 428% annual increase in Android banking malware. The following year, the overall increase was driven by adware. And 2023 saw a significant increase in Android spyware cases.<\/p><p>If you are asking what it means for your business, check out the results of the surveys discussed below.\u00a0<\/p><p>A <a href=\"https:\/\/www.statista.com\/statistics\/1147849\/share-adults-worldwide-employer-issued-device-personal-activities\/\" target=\"_blank\" rel=\"noopener\">2022 survey<\/a> of working adults and IT security professionals from across the world revealed that half of the respondents used their employer-issued devices to check personal emails and messages. A further 45% used their work devices for reading news stories, while 32% shopped online.<\/p><p>Ironically, <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers\/\" target=\"_blank\" rel=\"noopener\">emails<\/a>, <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/telekopye-hunting-mammoths-using-telegram-bot\/\" target=\"_blank\" rel=\"noopener\">online shops<\/a>, and even<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/unlucky-kamran-android-malware-spying-urdu-speaking-residents-gilgit-baltistan\/\" target=\"_blank\" rel=\"noopener\"> news portals<\/a> were the precise attack vectors described in several pieces of ESET research in 2023.<\/p><p>When it comes to employees using their own devices, 48% of organizations deploying a Bring Your Own Device (BYOD) policy witnessed malware being introduced through an employee\u2019s personal phone, according to a <a href=\"https:\/\/insights.samsung.com\/2023\/05\/31\/mobile-devices-and-your-employees-to-byod-or-not-to-byod\/\" target=\"_blank\" rel=\"noopener\">Samsung 2023 survey<\/a>.<\/p><p>If you wonder what\u2019s behind these compromises, <a href=\"https:\/\/www.statista.com\/statistics\/1406185\/cyber-incidents-employee-mistakes\/\" target=\"_blank\" rel=\"noopener\">another 2022 survey<\/a> found that the most common mistake contributing to cyber incidents is employees\u2019 poor password hygiene and misuse of personal email.<\/p><\/div><div id=\"content-c10647591\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Real-life examples<\/h3><\/header><p>Maybe those numbers are too general, so let\u2019s see some real examples of how a malicious app installed on an employee\u2019s smartphone can endanger the whole company.<\/p><p>Last year, ESET researchers <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps\/\" target=\"_blank\" rel=\"noopener\">published a blog<\/a> about two campaigns targeting Android users that had been active since July 2020 and July 2022, respectively, and were distributed across several app stores and dedicated websites.\u00a0<\/p><p>The threat actors in question patched open-source <a href=\"https:\/\/signal.org\/\" target=\"_blank\" rel=\"noopener\">Signal <\/a>and <a href=\"https:\/\/web.telegram.org\/k\/\" target=\"_blank\" rel=\"noopener\">Telegram <\/a>apps for Android OS with malicious code that ESET researchers later identified as BadBazaar. These malicious apps went by the name Signal Plus Messenger and FlyGram, and their purpose was to exfiltrate user data, such as contacts, call logs, and the users\u2019 list of Google accounts.<\/p><p>The Signal Plus Messenger app proved even more dangerous than FlyGram with its unique capability to spy on the victim\u2019s communications in the legitimate Signal app, an app that is often<a href=\"https:\/\/www.pcmag.com\/picks\/best-secure-messaging-apps\" target=\"_blank\" rel=\"noopener\"> praised for its reliability <\/a>and that is trusted by high-value targets, such as <a href=\"https:\/\/freedom.press\/training\/locking-down-signal\/\" target=\"_blank\" rel=\"noopener\">journalists<\/a>.<\/p><p>However, after installing Signal Plus Messenger, threat actors were able to connect the compromised device to the attacker\u2019s (Signal equipped) device and read its messages. Such sensitive information could be used in further spear phishing attacks against business officials.<\/p><p>A similar case was covered in June 2023, when ESET researchers published research on <a href=\"https:\/\/www.welivesecurity.com\/2023\/06\/15\/android-gravityrat-goes-after-whatsapp-backups\/\" target=\"_blank\" rel=\"noopener\">Android GravityRAT spyware<\/a>. This malware was distributed within the malicious but functional messaging apps BingeChat and Chatico \u2014 both based on the OMEMO Instant Messenger app. The spyware can exfiltrate call logs, contacts, SMS messages, the device location, basic device information, and files with specific extensions, such as jpg, PNG, txt, pdf, etc.<\/p><p>If your company has a BYOD policy, taking an interest in Android malware, the threat behind the <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h22023.pdf\" target=\"_blank\" rel=\"noopener\">89% increase in ESET telemetry <\/a>detections in the second half of 2023 is a must. This increase was primarily due to a mobile marketing software development kit (SDK) that ESET identifies as <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/spinok-trojan-compromises-421m\/\" target=\"_blank\" rel=\"noopener\">SpinOk Spyware<\/a>.<\/p><p>This SDK was offered as a gaming platform and was incorporated into numerous legitimate Android applications, including many available on official app marketplaces. Once an app with the aforementioned SpinOK SDK is installed, it operates like spyware, connecting to a command-and-control server and extracting a range of data from the device, including potentially sensitive clipboard (short-term storage) contents.<\/p><p>Again, this attack can impact employees who might &#8220;Game\u201d on their smartphones, gathering sensitive data that can later be used against their company.<\/p><\/div><div id=\"content-c10647592\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Other attacks<\/h3><\/header><p>So far, we have been describing spyware detected by ESET researchers during past year, but there are also other threats to business coming from mobile devices.\u00a0<\/p><ul><li><strong>Other malicious apps \u2013 <\/strong>Not all malicious apps are spyware going after messages and files in a mobile device. Some of them, for example, try to lure victims into <a href=\"https:\/\/www.welivesecurity.com\/2018\/10\/24\/banking-trojans-continue-surface-google-play\/\" target=\"_blank\" rel=\"noopener\">giving their bank account credentials<\/a> or <a href=\"https:\/\/www.welivesecurity.com\/2020\/06\/24\/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor\/\" target=\"_blank\" rel=\"noopener\">encrypt files<\/a> in the victim\u2019s device and ask for a ransom.<\/li><li><strong>Phishing \u2013<\/strong> Some of the <a href=\"https:\/\/www.upguard.com\/blog\/biggest-data-breaches\" target=\"_blank\" rel=\"noopener\">biggest data breaches <\/a>in history started with one employee falling for a phishing message, giving credentials, and letting cybercriminals enter the company\u2019s network.\u00a0<\/li><li><strong>Physical theft \u2013 <\/strong>Physical theft or loss of a corporate mobile device could be a serious cyber incident, especially if the <a href=\"https:\/\/krebsonsecurity.com\/2023\/05\/re-victimization-from-police-auctioned-cell-phones\/\" target=\"_blank\" rel=\"noopener\">smartphone or tablet contains sensitive information <\/a>and is locked by a weak password. <span lang=\"EN-US\">And such things happen often. In <a href=\"https:\/\/www.bbc.com\/news\/uk-england-london-66442069\" target=\"_blank\" rel=\"noopener\">London alone, 90,864 phones<\/a> were stolen in 2022.\u00a0 <\/span><\/li><li><strong>Vulnerabilities \u2013<\/strong> If you think that you are safe with using only standard cloud-based team communications platforms such as Microsoft Teams or Slack, think twice. <a href=\"https:\/\/www.eset.com\/blog\/business\/?tx_news_pi1%5Baction%5D=detail&amp;tx_news_pi1%5Bcontroller%5D=News&amp;tx_news_pi1%5Bnews%5D=416920\" target=\"_blank\" rel=\"noopener\">Vulnerabilities <\/a>and <a class=\"Invite\" title=\"Link&amp;apos;&amp;apos;\" href=\"http:\/\/file:\/\/C:\\Users\\james.shepperd\\AppData\\Local\\Microsoft\\Windows\\INetCache\\Content.Outlook\\K1QN4ET9\\The\" target=\"&amp;apos;&amp;apos;Shared\">bugs <\/a>that can lead to a data breach don\u2019t spare even the biggest names on the market.<\/li><li><strong>Worms \u2013 <\/strong>Because laptops and smartphones use different operating systems, it is rare to see one malware that spreads and executes in different environments. However, there have been cases such as the <a href=\"https:\/\/www.techtarget.com\/searchmobilecomputing\/answer\/Can-smartphones-get-viruses-and-spread-them-to-the-network\" target=\"_blank\" rel=\"noopener\">Hamweq.A worm<\/a>, which used smartphones as carriers to spread malware into Windows PCs via the USB cable.<\/li><\/ul><\/div><div id=\"content-c10647593\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Valuable targets<\/h3><\/header><p>Most employees probably don\u2019t use their mobile devices for accounting, coding, or administrative duties, but previously mentioned real-life cases clearly show that they are valuable targets for cybercriminals nonetheless. This makes them a potential liability to a business\u2019s cyberdefenses.<\/p><p>This is why having complex, multilayered protection of your mobile devices within a unified cybersecurity platform is so important. If you want to protect that Achilles\u2019 heel and are interested in ESET solutions for companies and their mobile devices, <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/mobile-threat-defense\/\" target=\"_blank\" rel=\"noopener\">click here<\/a>.\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The number of Android threats detected by ESET telemetr [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-78678","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Armor your Achilles\u2019 heel. Reduce your business&#039; attack surface vectoring from employee mobile devices - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Armor your Achilles\u2019 heel. Reduce your business&#039; attack surface vectoring from employee mobile devices - Version 2\" \/>\n<meta property=\"og:description\" content=\"The number of Android threats detected by ESET telemetr [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-30T08:54:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Armor your Achilles\u2019 heel. Reduce your business&#8217; attack surface vectoring from employee mobile devices\",\"datePublished\":\"2024-05-30T08:54:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/\"},\"wordCount\":1157,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd-2-thumb-250x250.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/\",\"name\":\"Armor your Achilles\u2019 heel. Reduce your business' attack surface vectoring from employee mobile devices - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd-2-thumb-250x250.png\",\"datePublished\":\"2024-05-30T08:54:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd-2-thumb-250x250.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/b2b-emtd-2-thumb-250x250.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Armor your Achilles\u2019 heel. Reduce your business&#8217; attack surface vectoring from employee mobile devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Armor your Achilles\u2019 heel. Reduce your business' attack surface vectoring from employee mobile devices - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/","og_locale":"zh_HK","og_type":"article","og_title":"Armor your Achilles\u2019 heel. Reduce your business' attack surface vectoring from employee mobile devices - Version 2","og_description":"The number of Android threats detected by ESET telemetr [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/","og_site_name":"Version 2","article_published_time":"2024-05-30T08:54:41+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/05\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Armor your Achilles\u2019 heel. Reduce your business&#8217; attack surface vectoring from employee mobile devices","datePublished":"2024-05-30T08:54:41+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/05\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/"},"wordCount":1157,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/05\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/","url":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/","name":"Armor your Achilles\u2019 heel. Reduce your business' attack surface vectoring from employee mobile devices - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png","datePublished":"2024-05-30T08:54:41+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/b2b-emtd-2-thumb-250x250.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/armor-your-achilles-heel-reduce-your-business-attack-surface-vectoring-from-employee-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Armor your Achilles\u2019 heel. Reduce your business&#8217; attack surface vectoring from employee mobile devices"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kt0","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=78678"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78678\/revisions"}],"predecessor-version":[{"id":78682,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/78678\/revisions\/78682"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=78678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=78678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=78678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}