Further reading

Mobile Security Index
2021 Report

Please provide the information below and then check your email for a link to view the online Verizon Mobile Security Index report.

Thank you.

You will soon receive an email with a link to confirm your access. When you click to confirm from your email, your document will be available for download.

If you do not receive an email within 2 hours, please check your spam folder.

Thank you.

You may now close this message and continue to your article.

  • Verizon thought leadership

    Verizon is committed to sharing analysis and insights with the rest of the industry, law enforcement, and public- and private-sector organizations in the interest of improving the security of devices, data and critical infrastructure. As part of this commitment, we publish a number of pieces of research and thought leadership.
     

    Other Verizon Mobile Security Index publications

    Industry spotlights
    These concise reports provide detailed insights into the state of mobile security in four key vertical sectors:

     

    • Public safety spotlight
      Find the mobile security insights first responders need today. 
      Learn more

    • Public sector spotlight
      Learn about the state of mobile security in the public sector, including local, state, and federal government and educational institutions. 
      Learn more
  • Other Verizon security reports

  • DBIR cover
  • Data Breach Investigations Report

    The Data Breach Investigations Report (DBIR) is one of the IT industry’s foremost security publications. Since 2008, it has provided highly respected insight into the state of cybersecurity based on analysis of real incidents. Overall, the DBIR team has analyzed over 375,000 security incidents, including nearly 18,000 confirmed data breaches, from around the world. The 14th edition will be published in mid-2021.

    Learn more
  • Cyber Espionage Report cover
  • Cyber-Espionage Report

    The Cyber-Espionage Report is a data-driven publication that focuses on advanced cyberattacks as reflected in the DBIR “Cyber-Espionage” incident classification pattern. It sheds light on the state of cyber-espionage based on analysis of seven years (2014–2020) of DBIR data. This includes identifying the threat actors and the tactics, techniques and procedures they use. Just as importantly, it identifies the victims, attributes, assets and data they target and details what can be done to prevent, mitigate, detect and respond to attacks.

    Learn more
  • PSR cover
  • Payment Security Report

    Verizon’s annual Payment Security Report on payment card security has become vital reading for those responsible for security payment systems. Driven by its analysis of compliance with the Payment Card Industry Data Security Standard (PCI DSS), it offers valuable insight into building proactive, robust security controls and achieving genuine data protection, not just passing the test.

    Learn more
  • Additional resources from government and law enforcement agencies
     

    • FBI advisories on BEC
      Read the FBI’s statistics on the rise of reported incidents of business email compromise (BEC) fraud around the world. Learn about total reported losses and how to protect your own organization. Learn more

    • FBI advisories on ransomware
      Find out how cybercriminals use a variety of techniques to infect their victims’ systems with ransomware, how you can protect your organization and what you should do if you’ve been affected. Learn more

    • Mobile security updates from NIST’s Center of Excellence
      The National Cybersecurity Center of Excellence (NCCoE) mobile device security efforts are dedicated to solving businesses’ most pressing mobile cybersecurity challenges. Learn more

    • USSS Preparing for a Cyber Incident
      Prepare for the inevitable with this guide from the U.S. Secret Service (USSS). It describes what organizations should do to build an understanding of the technological and regulatory limitations, responsibilities, and resources available to them, and how to apply that knowledge to their operations. Learn more

    • NIST guidance on COPE devices
      Get helpful guidance on managing corporate-owned personally enabled (COPE) mobile devices and reducing the risk these devices can pose to cybersecurity. Learn more

    • U.K. Home Office buyers’ guide to mobile security
      Find simple guidance on securing your mobile device from the Home Office of Her Majesty’s Government of the United Kingdom, responsible for immigration, security, and law and order. Suitable for sharing with device users. Learn more

Let's get started.