Verizon thought leadership
Verizon is committed to sharing analysis and insights with the rest of the industry, law enforcement, and public- and private-sector organizations in the interest of improving the security of devices, data and critical infrastructure. As part of this commitment, we publish a number of pieces of research and thought leadership.
Other Verizon Mobile Security Index publications
Industry spotlights
These concise reports provide detailed insights into the state of mobile security in four key vertical sectors:- Public safety spotlight
Find the mobile security insights first responders need today.
Learn more - Public sector spotlight
Learn about the state of mobile security in the public sector, including local, state, and federal government and educational institutions.
Learn more
- Public safety spotlight
Further reading
Mobile Security Index
2021 Report
Please provide the information below and then check your email for a link to view the online Verizon Mobile Security Index report.
Thank You.
Gracias.
You will soon receive an email with a link to confirm your access. When you click to confirm from your email, your document will be available for download.
If you do not receive an email within 2 hours, please check your spam folder.
Gracias.
You may now close this message and continue to your article.
Other Verizon security reports
Data Breach Investigations Report
The Data Breach Investigations Report (DBIR) is one of the IT industry’s foremost security publications. Since 2008, it has provided highly respected insight into the state of cybersecurity based on analysis of real incidents. Overall, the DBIR team has analyzed over 375,000 security incidents, including nearly 18,000 confirmed data breaches, from around the world. The 14th edition will be published in mid-2021.
Descubre más
Cyber-Espionage Report
The Cyber-Espionage Report is a data-driven publication that focuses on advanced cyberattacks as reflected in the DBIR “Cyber-Espionage” incident classification pattern. It sheds light on the state of cyber-espionage based on analysis of seven years (2014–2020) of DBIR data. This includes identifying the threat actors and the tactics, techniques and procedures they use. Just as importantly, it identifies the victims, attributes, assets and data they target and details what can be done to prevent, mitigate, detect and respond to attacks.
Descubre más
Payment Security Report
Verizon’s annual Payment Security Report on payment card security has become vital reading for those responsible for security payment systems. Driven by its analysis of compliance with the Payment Card Industry Data Security Standard (PCI DSS), it offers valuable insight into building proactive, robust security controls and achieving genuine data protection, not just passing the test.
Descubre más
Additional resources from government and law enforcement agencies
- FBI advisories on BEC
Read the FBI’s statistics on the rise of reported incidents of business email compromise (BEC) fraud around the world. Learn about total reported losses and how to protect your own organization. Learn more - FBI advisories on ransomware
Find out how cybercriminals use a variety of techniques to infect their victims’ systems with ransomware, how you can protect your organization and what you should do if you’ve been affected. Learn more - Mobile security updates from NIST’s Center of Excellence
The National Cybersecurity Center of Excellence (NCCoE) mobile device security efforts are dedicated to solving businesses’ most pressing mobile cybersecurity challenges. Learn more - USSS Preparing for a Cyber Incident
Prepare for the inevitable with this guide from the U.S. Secret Service (USSS). It describes what organizations should do to build an understanding of the technological and regulatory limitations, responsibilities, and resources available to them, and how to apply that knowledge to their operations. Learn more - NIST guidance on COPE devices
Get helpful guidance on managing corporate-owned personally enabled (COPE) mobile devices and reducing the risk these devices can pose to cybersecurity. Learn more - U.K. Home Office buyers’ guide to mobile security
Find simple guidance on securing your mobile device from the Home Office of Her Majesty’s Government of the United Kingdom, responsible for immigration, security, and law and order. Suitable for sharing with device users. Learn more
- FBI advisories on BEC
Let's get started.
Choose your country to view contact details.
Call for Sales.
Or we'll call you.
Existing customers, sign in to your business account or explore other support options.