• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Techmobile security

Is your phone safe for work?

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
October 15, 2015, 3:55 PM ET
Lookout CTO Kevin Mahaffey Interview
Kevin Mahaffey, co-founder and chief technology officer of Lookout Inc., stands for a photograph after a Bloomberg West Television interview in San Francisco, California, U.S., on Wednesday, Sept. 4, 2013. Lookout Inc., provides security systems for mobile networks and electronic devices. Photographer: David Paul Morris/Bloomberg via Getty ImagesPhotograph by David Paul Morris — Bloomberg via Getty Images

Mobile security is an increasingly important frontier in the war between hackers and cyber defenders. The past year alone has been a steady stream of Apple iOS hacks, Google (GOOG) Android snafus, and other problems for mobile phones and tablets.

Are businesses paying enough attention to that risk?

Fortune checked in with Kevin Mahaffey, co-founder and chief technology officer at mobile security firm Lookout, about the state of mobile security. His company recently released a survey examining the issue.

Mahaffey’s company, based in San Francisco, develops apps that detect and defend against electronic attacks. It was founded in 2007, the same year Apple (AAPL) unveiled the iPhone.

In June, Lookout entered the enterprise market where it competes with companies like Check Point (CHKP). Lookout has 75 million users worldwide, about half of whom are in the United States.

“We were a company started by nerds and engineers—we like using data to understand things,” says Mahaffey of Lookout’s recent research report.

The most surprising finding in the report, he says, is the percentage of data breaches attributable to mobile devices. Nearly three-quarters of the 100 IT and security leads surveyed (about half of whom are chief information security officers) reported that their organizations have “experienced a data breach as a result of a mobile security issue.”

Common reasons for mobile data breaches? Malware-laden apps, security holes, and unsecured Wi-Fi connections, according to the study.

As businesses continue to let employees use their personal devices for work, smartphone security is likely to rank higher and higher on the IT priority list. That much the report makes clear. “Mobile devices are not just being used to post to Twitter and read email anymore,” Mahaffey says. “Everything I can do on my laptop, I can do on my mobile device.”

As many as 82% of respondents said that employees in their organizations have access to “the majority of their corporate data” through mobile devices. That reality—intended to lift worker productivity—means that hackers have more ways to gain access to corporate networks. And the IT leads recognize that threat: Nine out of 10 respondents said they plan to invest more in mobility security over the next year. (No doubt good news for Lookout.)

Despite the survey’s findings, the tone of Lookout’s report conflicts with that of another highly cited data breach study: Verizon’s 2015 data breach investigations report. That study downplays the threat posed by handsets.

In Verizon’s (VZA) view, mobile security is not yet a big issue. “This report is filled with thousands of stories of data loss—as it has been for years—and rarely do those stories include a smartphone,” the Verizon report’s authors write. But they concede that those circumstances will likely eventually change.

Why the disparity, then, between Verizon’s findings and Lookout’s?

Mahaffey says that the different findings might be due to their surveys’ differing methodologies. Verizon’s data is mostly based on its computer forensics team and the breach-related messes at other companies that it’s called in to fix. Meanwhile, Lookout’s report is based on asking IT pros to self-report incidents that their organizations most likely handled internally.

Not all data breaches are created equal, of course. So, perhaps these intrusions in the Lookout report were not as severe.

In any case, it’s always a good idea to take reports by companies with a self-interest in the matter with a grain of salt. Security firms sometimes inflate the risk of attacks to drum up business. Meanwhile, wireless carriers may have an incentive to downplay the risk so as to avoid scaring customers.

As for Mahaffey, he’s undaunted by Verizon’s findings about the relative safety of mobile devices.

“The bad guys, whenever they see gold, they go after it,” he says.

Subscribe to Data Sheet, Fortune’s daily newsletter on the business of technology.

For more on mobile security, watch the video below.

[fortune-brightcove videoid=4403273310001]

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

LawElon Musk
Musk misled Twitter investors before 2022 buyout, jury says
By Isaiah Poritz, Jef Feeley and BloombergMarch 20, 2026
3 hours ago
bespectacled man scratches the back of his head during congressional hearing
CryptoCryptocurrency
Kalshi locks in $22 billion valuation, gaining slight edge over its rival Polymarket
By Carlos GarciaMarch 20, 2026
6 hours ago
Big TechEntrepreneurs
Mark Cuban reads 1,000 emails a day—now he’s using a Mac Mini to fight the AI-generated flood threatening his clean inbox obsession
By Marco Quiroz-GutierrezMarch 20, 2026
7 hours ago
Stressed out job seeker on laptop
Successjob hunting
Job seekers aren’t imagining things: the number of candidates ghosted by employers just reached a three-year high thanks to AI
By Emma BurleighMarch 20, 2026
10 hours ago
SuccessCareers
AI boom is fueling demand for skilled trades—and demand for technicians, HVAC workers, and electricians is soaring, with six-figure salaries to match
By Preston ForeMarch 20, 2026
11 hours ago
LawX
Three Tennessee teenagers are suing Elon Musk’s xAI for creating sexually explicit images of them
By The Associated Press and Travis LollerMarch 20, 2026
12 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.