SlideShare a Scribd company logo
1 of 12
Download to read offline
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
June 2013
Sponsored by
© 2013 Dimensional Research.
All Rights Reserved.
www.dimensionalresearch.com
Introduction
Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate
information can be easily transported and lost, while the Bring Your Own Device (BYOD) movement has
dramatically increased the number of expensive security incidents.
The following report, sponsored by Check Point, is based on a global survey of 790 IT professionals conducted in
the United States, Canada, United Kingdom, Germany, and Japan. This is the second survey on this topic, and this
report evaluates differences in responses to similar questions asked one year ago. The goal of the survey was to
gather data to quantify the impact of mobile devices on corporate information security.
Executive Summary
1.		BYOD is growing dramatically and affecting enterprises of all sizes
2.		Corporate information on a mobile device is a more important asset than the device itself
3.		Mobile security incidents are costly, even for SMBs
Key Findings
•	 Increasing numbers of mobile devices connect to corporate networks
-- 93% have mobile devices connecting to their corporate networks
-- 67% allow personal devices to connect to corporate networks
•	 BYOD grows quickly and creates problems for organizations
Among companies that allow personal devices to connect to corporate networks:
-- 96% say number of personal devices connecting to corporate networks is growing
-- 45% have more than five times as many personal mobile devices as they had two years ago, an increase from
36% last year
-- 63% do not manage corporate information on personal devices
-- 93% face challenges adopting BYOD policies
-- Securing corporate information cited as greatest BYOD challenge (67%)
•	 Customer information on mobile devices causes security concerns
-- 53% report there is sensitive customer information on mobile devices, up from 47% last year
-- 94% indicate lost or stolen customer information is grave concern in a mobile security incident
•	 Mobile security incidents very expensive
-- 79% report mobile security incidents in the past year
-- 52% of large companies say cost of mobile security incidents last year exceeded $500,000
-- 45% of businesses with less than 1000 employees reported mobile security incident costs exceeding $100,000
-- 49% cite Android as platform with greatest perceived security risk (up from 30% last year), compared to
Apple, Windows Mobile, and Blackberry
-- 66% say careless employees greater security risk than cybercriminals
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
Sponsored by
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 3
Detailed Findings
Extensive use of mobile devices on corporate networks
Participants were asked if mobile devices, such as smartphones or tablets, connected to their corporate networks.
Broad use of mobile devices was reported, with 93% saying that they had mobile devices connecting to corporate
networks. This is an increase compared to 89% in 2012.
More corporate networks include personal devices
Just over two-thirds of organizations, 67%, have devices owned personally by employees, contractors, or others
that connect to their corporate networks. This included 65% who allow both personal and company owned mobile
devices, as well as 2% that had only personally owned mobile devices on their networks. This is an increase
compared to 65% in 2012.
89%	
  
93%	
  
11%	
  
7%	
  
50%	
   55%	
   60%	
   65%	
   70%	
   75%	
   80%	
   85%	
   90%	
   95%	
   100%	
  
2012	
  
2013	
  
Mobile	
  devices	
  connected	
  to	
  the	
  corporate	
  network	
  
Yes	
  
No	
  
(n= 790 All)
Both	
  personal	
  
and	
  company	
  
owned	
  mobile	
  
devices	
  
65%	
  
Only	
  personally	
  
owned	
  mobile	
  
devices	
  
2%	
  
Only	
  company	
  
owned	
  mobile	
  
devices	
  
26%	
  
None	
  
7%	
  
Types	
  of	
  mobile	
  devices	
  connected	
  to	
  the	
  
corporate	
  network	
  
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 4
The use of personal mobile devices for work is very consistent across companies of all sizes. Little variation was
seen in the number of businesses saying they have personal mobile devices on their corporate networks from the
smallest businesses (68%) to the largest (65%).
Personal mobile devices at work continue to expand
IT professionals whose companies do allow personally owned mobile devices to connect to corporate networks were
asked how much growth there has been in the past two years. The vast majority, 96%, have seen an increase in the use
of mobile devices connecting to corporate networks. For some companies, the increase was very dramatic with 45%
saying they have more than five times as many personal mobile devices on their networks as they did two years ago.
No	
  increase	
  
4%	
  
Less	
  than	
  2	
  1mes	
  	
  
8%	
  
Between	
  2	
  and	
  5	
  1mes	
  	
  	
  
43%	
  
More	
  than	
  5	
  1mes	
  	
  
45%	
  
Increase	
  in	
  use	
  of	
  personal	
  mobile	
  devices	
  on	
  corporate	
  networks	
  
(n= 507 Have personal mobile devices on corporate network)
67%	
   68%	
   66%	
   65%	
  
0%	
  
10%	
  
20%	
  
30%	
  
40%	
  
50%	
  
60%	
  
70%	
  
80%	
  
All	
   Less	
  than	
  1000	
  
employees	
  
1000	
  -­‐	
  5,000	
  employees	
   More	
  than	
  5000	
  
employees	
  
Personal	
  mobile	
  devices	
  connect	
  to	
  corporate	
  networks	
  
(By	
  company	
  size)	
  
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 5
This growth is even more dramatic than last year. In 2012, the same question was asked. Only 36% of companies
have more than five times as many personal devices connecting to corporate networks compared to 45% in this
year’s survey.
Securing corporate information greatest challenge in adopting BYOD
BYOD is causing challenges for corporate IT. Among companies that allow personal devices on their networks, the
vast majority, 93%, reported that when employees use their own smartphones, tablets, or other devices to work with
business information, it causes issues.
Participants reported that the most common challenge faced by IT organizations in adopting BYOD was securing
corporate information (67%), closely followed by tracking and controlling access to networks (63%).
(n=507 Have personal mobile devices on corporate network)
7%	
  
14%	
  
38%	
  
59%	
  
63%	
  
67%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
   80%	
  
No	
  challenges	
  
Finding	
  agnos:c	
  security	
  solu:ons	
  (i.e.	
  managing	
  all	
  OSes)	
  
Keep	
  device	
  opera:ng	
  system	
  and	
  applica:ons	
  updated	
  
Managing	
  personal	
  devices	
  that	
  contain	
  both	
  corporate	
  and	
  personal	
  
data	
  and	
  applica:ons	
  
Tracking	
  and	
  controlling	
  access	
  to	
  corporate	
  and	
  private	
  networks	
  
Securing	
  corporate	
  informa:on	
  
Challenges	
  with	
  BYOD	
  
6%	
  
4%	
  
16%	
  
8%	
  
42%	
  
43%	
  
36%	
  
45%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
   80%	
   90%	
   100%	
  
2012	
  
2013	
  
No	
  increase	
  
Less	
  than	
  2	
  9mes	
  	
  
Between	
  2	
  and	
  5	
  9mes	
  	
  	
  
More	
  than	
  5	
  9mes	
  	
  
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 6
Corporate information on personal devices not managed by IT
Almost two-thirds, 63%, of companies who have personally owned mobile devices connecting to their corporate
networks do not manage the corporate information that resides there. Among those who do manage the information,
active-synch policies were the most common (21%), followed by Mobile Device Management (MDM) tools (15%),
and secure container (8%).
Larger companies were the most likely to manage corporate information on personally owned devices. Very few
companies with less than 1000 employees, 17%, use a technical approach to information management on employee’s
mobile devices, significantly less than the comparable 66% of companies with more than 5000 employees.
(n= 507 Have personal mobile devices on corporate network)
63%	
  
8%	
  
15%	
  
21%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
  
We	
  do	
  not	
  manage	
  corporate	
  informa:on	
  on	
  employee-­‐
owned	
  devices	
  
Secure	
  container	
  
Mobile	
  Device	
  Management	
  (MDM)	
  tool	
  
Ac:ve-­‐synch	
  policy	
  
Approach	
  to	
  managing	
  business	
  data	
  on	
  personally	
  owned	
  devices	
  
37%	
  
17%	
  
47%	
  
66%	
  
0%	
  
10%	
  
20%	
  
30%	
  
40%	
  
50%	
  
60%	
  
70%	
  
All	
   Less	
  than	
  1000	
  
employees	
  
1000	
  -­‐	
  5,000	
  employees	
   More	
  than	
  5000	
  
employees	
  
IT	
  manages	
  the	
  corporate	
  informa2on	
  on	
  personally	
  
owned	
  mobile	
  devices	
  
(By	
  company	
  size)	
  
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 7
More types of information on mobile devices today
Participants reported an increase in all types of information stored on mobile devices compared to last year.
Corporate email, the most common type of corporate information reported, increased from 79% of mobile devices
last year to 88% this year.
More companies have their most sensitive business information stored on mobile devices. Customer data stored
on mobile devices increased from 47% in 2012 to 53% in 2013. Corporate information on mobile devices through
business apps installed on mobile devices saw the greatest increase with a 17% rise from 2012 to 2013.
Possible loss of corporate information from mobile devices ranked most concerning
Mobile security incidents can have a wide range of impacts. Participants were presented with a list of possible
impacts and asked to rank them from first to last with the first being the factor that was the most impactful and the
last being the factor that was the least impactful. Lost or stolen devices was ranked number 1 as the factor that had
the greatest impact on the vulnerability of mobile data, followed by malicious applications downloaded to the mobile
device. The high rate of users changing or upgrading their mobile device was ranked last as a factor impacting
mobile security.
28%	
  
30%	
  
38%	
  
32%	
  
47%	
  
65%	
  
79%	
  
33%	
  
46%	
  
48%	
  
49%	
  
53%	
  
72%	
  
74%	
  
88%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
   80%	
   90%	
   100%	
  
Confiden3al	
  notes	
  
Photos/video	
  
Network	
  login	
  creden3als	
  
Corporate	
  informa3on	
  via	
  business	
  apps	
  
Customer	
  data	
  
Corporate	
  calendar*	
  
Contact	
  informa3on	
  for	
  colleagues,	
  customers,	
  partners	
  
Corporate	
  email	
  
Corporate	
  informa-on	
  stored	
  on	
  mobile	
  devices	
  
2013	
  
2012	
  
*Not asked in 2012 survey	 (n=736 Have mobile devices on corporate networks)
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 8
Loss of corporate information greatest concern during a mobile security incident
Mobile security incidents can have a wide range of impacts. Participants who had mobile devices on their corporate
networks, including both personal and business, were presented with a list of possible issues that could occur as a
result of a mobile security incident and asked which were most concerning.
Possible loss of corporate information was by far the most concerning (94%). The cost of replacing the lost device
ranked a distant second (20%).
(n=736 Have mobile devices on corporate networks)
(n=736 Have mobile devices on corporate networks)
Weighted Score
10%	
  
20%	
  
94%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
   80%	
   90%	
   100%	
  
Compliance	
  viola8ons	
  and	
  fines	
  
(Cost	
  of	
  replacing	
  lost	
  or	
  stolen	
  devices	
  
Lost	
  or	
  stolen	
  informa8on	
  
Concerns	
  when	
  a	
  mobile	
  security	
  incident	
  is	
  experienced	
  
7.	
  High	
  rate	
  of	
  users	
  changing	
  or	
  upgrading	
  their	
  mobile	
  device	
  
6.	
  Lack	
  of	
  employee	
  awareness	
  about	
  security	
  policies	
  
5.	
  Lack	
  of	
  security	
  patches	
  from	
  service	
  providers	
  
4.	
  Insecure	
  web	
  browsing	
  
3.	
  Unsecured	
  Wi-­‐Fi	
  connecEvity	
  
2.	
  Malicious	
  applicaEons	
  downloaded	
  to	
  the	
  mobile	
  device	
  
1.	
  Lost	
  or	
  stolen	
  mobile	
  devices	
  with	
  corporate	
  data	
  
Ranking	
  of	
  factors	
  impac0ng	
  the	
  vulnerability	
  of	
  mobile	
  data	
  
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 9
Mobile security incidents are expensive
Once companies have mobile devices, security incidents happen and the costs are substantial. Most companies, 79%,
that have mobile devices on their networks have had a mobile security incident in the past year. The majority, 57%,
reported that the total costs of their mobile security incidents cost them from $10,000 to more than $500,000 in the
past year. These costs included staff time, legal fees, fines, resolution processes, and so on.
When security incidents did happen, the cost was most substantial at the largest companies. Among those who work
at companies with over 5000 employees, more than half (52%) reported that last year the cost of mobile security
incidents exceeded $500,000. However, even SMBs reported that mobile security incidents were very expensive.
Almost half of companies with less than 1000 employees, 45%, reported security incidents that cost more than
$100,000, a significant amount for a small firm.
No	
  mobile	
  security	
  
incidents	
  
21%	
  
Less	
  than	
  $10,000	
  
22%	
  
$10,000	
  -­‐	
  $100,000	
  
15%	
  
$100,000	
  -­‐	
  $500,000	
  
13%	
  
$250,000	
  -­‐	
  $500,000	
  
13%	
  
More	
  than	
  $500,000	
  
16%	
  
Cost	
  of	
  mobile	
  security	
  incidents	
  in	
  the	
  past	
  year	
  
(n=736 Have mobile devices on corporate networks)
(n=576 Have had mobile security incident in the past year)
36%	
  
23%	
  
12%	
  
19%	
  
19%	
  
14%	
  
18%	
  
23%	
  
8%	
  
17%	
  
18%	
  
14%	
  
10%	
  
18%	
  
52%	
  
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
   80%	
   90%	
   100%	
  
Less	
  than	
  1000	
  employees	
  	
  
1000	
  -­‐	
  5,000	
  employees	
  
More	
  than	
  5000	
  employees	
  
Cost	
  of	
  mobile	
  security	
  incidents	
  in	
  the	
  past	
  year	
  
(By	
  company	
  size)	
  
Less	
  than	
  $10,000	
  
$10,000	
  -­‐	
  $100,000	
  
$100,000	
  -­‐	
  $250,000	
  
$250,000	
  -­‐	
  $500,000	
  
More	
  than	
  $500,000	
  
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 10
Android trusted less; Windows Mobile and BlackBerry trusted more for security
Participants were asked which of the most common mobile platforms they viewed as being the greatest risk to their
corporate security. Android was by far the most frequent platform indicated (49%), followed by Apple/iOS (25%)
and Windows Mobile (17%).
This question showed a dramatic change from the previous year. Android increased dramatically as the platform
perceived to have the greatest security risk. Windows Mobile and BlackBerry both saw the number of IT
professionals who viewed this as the most risky platform decrease by almost half.
Careless employees seen as a greater security risk than cybercriminals
Participants were asked which group of individuals was considered the greatest security risk — careless employees
or cybercriminals who intentionally try to steal corporate information. Significantly more said careless employees
pose greater security risks (66%) than cybercriminals (34%), which reinforces the importance of implementing a
strong combination of technology and security awareness throughout an organization.
(n=790 All)
(n=790 All)
Careless	
  
employees	
  
66%	
  
Cybercriminals	
  
34%	
  
Greater	
  impact	
  on	
  security	
  risk	
  of	
  mobile	
  devices	
  
12%
Decrease
7%
Decrease
19% IncreaseNo Change
25%
25%
30%
49%
29%
17%
16%
9%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
2012
2013
(2012 vs. 2013)
Apple/iOS
Android
Windows Mobile
Blackberry
Mobile platform perceived as greatest security risk
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 11
IT may not allow use of file-sharing sites, but policy is often not enforced
The use of mobile devices has driven the adoption of file-sharing sites such as DropBox, Box, Google Drive and
iCloud, which some IT organizations see as a concern for security of corporate data. Participants were asked if
employees are allowed to upload and share work information to public file-sharing applications. Organizations are
divided on their policies with some allowing all employees to access these sites (35%) and some not allowing any
employees (25%). Most allowed some employees while preventing others (40%).
However, these policies are not enforced uniformly. Organizations who do have policies that some or all of their
employees not use public file-sharing applications were asked whether they thought these policies were followed.
Only 38% actually enforce their policies by blocking these sites on the corporate network, while 28% admit that
some employees don’t follow the policy.
(n=790 All)
All	
  employees	
  can	
  use	
  
35%	
  
Some	
  employees	
  in	
  
certain	
  roles	
  	
  	
  
40%	
  
No	
  employees	
  can	
  use	
  
25%	
  
Policy	
  on	
  employee	
  use	
  of	
  public	
  file-­‐sharing	
  applica6ons	
  
2%	
  
26%	
  
34%	
  
38%	
  
0%	
   5%	
   10%	
   15%	
   20%	
   25%	
   30%	
   35%	
   40%	
  
Most	
  employees	
  don't	
  follow	
  the	
  policy	
  
Most	
  employees	
  follow	
  the	
  policy,	
  but	
  a	
  few	
  don't	
  
We	
  think	
  all	
  our	
  employees	
  follow	
  our	
  policy,	
  but	
  it	
  is	
  not	
  
enforced	
  
The	
  policy	
  is	
  definitely	
  followed	
  since	
  we	
  block	
  these	
  sites	
  
from	
  our	
  network	
  
Employee	
  adherence	
  to	
  policy	
  of	
  not	
  using	
  	
  public	
  file-­‐sharing	
  	
  
(n=512 Those with policies against use of public file-sharing)
THE IMPACT OF MOBILE DEVICES ON
INFORMATION SECURITY:
A SURVEY OF IT PROFESSIONALS
Dimensional Research | June 2013
www.dimensionalresearch.com
© 2013 Dimensional Research.
All Rights Reserved.
Page 12
Survey Methodology
An independent database of IT professionals was invited to participate in a web survey on the topic of mobile
devices and information security sponsored by Check Point. A total of 790 respondents across the United States,
Canada, United Kingdom, Germany, and Japan completed the survey. Each respondent had responsibility for
securing company systems. Participants included IT executives, IT managers, and hands-on IT professionals, and
represented a wide range of company sizes and industry verticals.
This survey is the second in a series of surveys on this topic. This report compares certain results to the results of
similar questions asked one year ago.
About Dimensional Research
Dimensional Research®
provides practical marketing research to help technology companies make their customers
more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand
how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks,
increases customer satisfaction, and grows the business. For more information visit www.dimensionalresearch.com.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet,
provides customers with uncompromised protection against all types of threats, reduces security complexity and
lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful
inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade
Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact
security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a
business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection
of information assets and helps organizations implement a blueprint for security that aligns with business needs.
Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies.
Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and
identity theft.
IT	
  execu(ve	
  
31%	
  
IT	
  manager	
  
40%	
  
Front-­‐line	
  IT	
  
professional	
  
29%	
  
Par$cipant	
  job	
  func$on	
  
Less	
  than	
  100	
  
17%	
  
100	
  -­‐	
  1000	
  
31%	
  1000	
  -­‐	
  5,000	
  
25%	
  
5,000	
  -­‐	
  15,000	
  
16%	
  
More	
  than	
  15,000	
  
11%	
  
Company	
  Size	
  
IT	
  security	
  is	
  my	
  
en.re	
  job	
  
31%	
  
IT	
  security	
  is	
  part	
  
of	
  my	
  job	
  	
  
69%	
  
Responsibility	
  for	
  IT	
  security	
  

More Related Content

What's hot

Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionEdelman
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?VMware
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 

What's hot (20)

Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
Network Management Megatrends 2020
Network Management Megatrends 2020Network Management Megatrends 2020
Network Management Megatrends 2020
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
2015 US Global Mobile Consumer Survey
2015 US Global Mobile Consumer Survey2015 US Global Mobile Consumer Survey
2015 US Global Mobile Consumer Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 

Viewers also liked

Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013Bee_Ware
 
O lada de bere pentru tine
O lada de bere pentru tineO lada de bere pentru tine
O lada de bere pentru tinelada-de-bere
 
Mexico ya acabado
Mexico ya acabadoMexico ya acabado
Mexico ya acabadolauranarnia
 
Budjetin voittajat ja häviäjät
Budjetin voittajat ja häviäjätBudjetin voittajat ja häviäjät
Budjetin voittajat ja häviäjätOlli Kärkkäinen
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรMark Mad
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre inforlissalejandra
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistryAsmaa Mohammed
 
To byod or not to byod
To byod or not to byodTo byod or not to byod
To byod or not to byodBee_Ware
 
Sote-uudistuksen verovaikutuksia
Sote-uudistuksen verovaikutuksiaSote-uudistuksen verovaikutuksia
Sote-uudistuksen verovaikutuksiaOlli Kärkkäinen
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home careTracy Steel
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Bee_Ware
 
Manufacturing
ManufacturingManufacturing
Manufacturingsudpal88
 
αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;
αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;
αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;MaryBalou
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape reportBee_Ware
 

Viewers also liked (20)

Pres
PresPres
Pres
 
Vivarana fyp report
Vivarana fyp reportVivarana fyp report
Vivarana fyp report
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Personal Persona Project
Personal Persona ProjectPersonal Persona Project
Personal Persona Project
 
O lada de bere pentru tine
O lada de bere pentru tineO lada de bere pentru tine
O lada de bere pentru tine
 
Mexico ya acabado
Mexico ya acabadoMexico ya acabado
Mexico ya acabado
 
Budjetin voittajat ja häviäjät
Budjetin voittajat ja häviäjätBudjetin voittajat ja häviäjät
Budjetin voittajat ja häviäjät
 
Canvas module
Canvas moduleCanvas module
Canvas module
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพรใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
ใบงาน แบบสำรวจและประวัติของ นาย พชร แก้วพนมพร
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Feliz dia del padre infor
Feliz dia del padre inforFeliz dia del padre infor
Feliz dia del padre infor
 
Top 10 professors of organic geochemistry
Top 10 professors of organic geochemistryTop 10 professors of organic geochemistry
Top 10 professors of organic geochemistry
 
To byod or not to byod
To byod or not to byodTo byod or not to byod
To byod or not to byod
 
Sote-uudistuksen verovaikutuksia
Sote-uudistuksen verovaikutuksiaSote-uudistuksen verovaikutuksia
Sote-uudistuksen verovaikutuksia
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home care
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;
αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;
αειφόρο νηπιαγωγείο ουτοπία ή δυνατότητα;
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 

Similar to The impact of mobile devices on information security

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableCapgemini
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Microsoft
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 

Similar to The impact of mobile devices on information security (20)

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
The Workplace of Things
The Workplace of ThingsThe Workplace of Things
The Workplace of Things
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

More from Bee_Ware

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnellesBee_Ware
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudBee_Ware
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Bee_Ware
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBee_Ware
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Bee_Ware
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsBee_Ware
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to goBee_Ware
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesBee_Ware
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéBee_Ware
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsBee_Ware
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Bee_Ware
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysisBee_Ware
 
X force report 2013
X force report 2013X force report 2013
X force report 2013Bee_Ware
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web securityBee_Ware
 

More from Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
X force report 2013
X force report 2013X force report 2013
X force report 2013
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web security
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

The impact of mobile devices on information security

  • 1. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS June 2013 Sponsored by
  • 2. © 2013 Dimensional Research. All Rights Reserved. www.dimensionalresearch.com Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the Bring Your Own Device (BYOD) movement has dramatically increased the number of expensive security incidents. The following report, sponsored by Check Point, is based on a global survey of 790 IT professionals conducted in the United States, Canada, United Kingdom, Germany, and Japan. This is the second survey on this topic, and this report evaluates differences in responses to similar questions asked one year ago. The goal of the survey was to gather data to quantify the impact of mobile devices on corporate information security. Executive Summary 1. BYOD is growing dramatically and affecting enterprises of all sizes 2. Corporate information on a mobile device is a more important asset than the device itself 3. Mobile security incidents are costly, even for SMBs Key Findings • Increasing numbers of mobile devices connect to corporate networks -- 93% have mobile devices connecting to their corporate networks -- 67% allow personal devices to connect to corporate networks • BYOD grows quickly and creates problems for organizations Among companies that allow personal devices to connect to corporate networks: -- 96% say number of personal devices connecting to corporate networks is growing -- 45% have more than five times as many personal mobile devices as they had two years ago, an increase from 36% last year -- 63% do not manage corporate information on personal devices -- 93% face challenges adopting BYOD policies -- Securing corporate information cited as greatest BYOD challenge (67%) • Customer information on mobile devices causes security concerns -- 53% report there is sensitive customer information on mobile devices, up from 47% last year -- 94% indicate lost or stolen customer information is grave concern in a mobile security incident • Mobile security incidents very expensive -- 79% report mobile security incidents in the past year -- 52% of large companies say cost of mobile security incidents last year exceeded $500,000 -- 45% of businesses with less than 1000 employees reported mobile security incident costs exceeding $100,000 -- 49% cite Android as platform with greatest perceived security risk (up from 30% last year), compared to Apple, Windows Mobile, and Blackberry -- 66% say careless employees greater security risk than cybercriminals THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 Sponsored by
  • 3. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 3 Detailed Findings Extensive use of mobile devices on corporate networks Participants were asked if mobile devices, such as smartphones or tablets, connected to their corporate networks. Broad use of mobile devices was reported, with 93% saying that they had mobile devices connecting to corporate networks. This is an increase compared to 89% in 2012. More corporate networks include personal devices Just over two-thirds of organizations, 67%, have devices owned personally by employees, contractors, or others that connect to their corporate networks. This included 65% who allow both personal and company owned mobile devices, as well as 2% that had only personally owned mobile devices on their networks. This is an increase compared to 65% in 2012. 89%   93%   11%   7%   50%   55%   60%   65%   70%   75%   80%   85%   90%   95%   100%   2012   2013   Mobile  devices  connected  to  the  corporate  network   Yes   No   (n= 790 All) Both  personal   and  company   owned  mobile   devices   65%   Only  personally   owned  mobile   devices   2%   Only  company   owned  mobile   devices   26%   None   7%   Types  of  mobile  devices  connected  to  the   corporate  network  
  • 4. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 4 The use of personal mobile devices for work is very consistent across companies of all sizes. Little variation was seen in the number of businesses saying they have personal mobile devices on their corporate networks from the smallest businesses (68%) to the largest (65%). Personal mobile devices at work continue to expand IT professionals whose companies do allow personally owned mobile devices to connect to corporate networks were asked how much growth there has been in the past two years. The vast majority, 96%, have seen an increase in the use of mobile devices connecting to corporate networks. For some companies, the increase was very dramatic with 45% saying they have more than five times as many personal mobile devices on their networks as they did two years ago. No  increase   4%   Less  than  2  1mes     8%   Between  2  and  5  1mes       43%   More  than  5  1mes     45%   Increase  in  use  of  personal  mobile  devices  on  corporate  networks   (n= 507 Have personal mobile devices on corporate network) 67%   68%   66%   65%   0%   10%   20%   30%   40%   50%   60%   70%   80%   All   Less  than  1000   employees   1000  -­‐  5,000  employees   More  than  5000   employees   Personal  mobile  devices  connect  to  corporate  networks   (By  company  size)  
  • 5. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 5 This growth is even more dramatic than last year. In 2012, the same question was asked. Only 36% of companies have more than five times as many personal devices connecting to corporate networks compared to 45% in this year’s survey. Securing corporate information greatest challenge in adopting BYOD BYOD is causing challenges for corporate IT. Among companies that allow personal devices on their networks, the vast majority, 93%, reported that when employees use their own smartphones, tablets, or other devices to work with business information, it causes issues. Participants reported that the most common challenge faced by IT organizations in adopting BYOD was securing corporate information (67%), closely followed by tracking and controlling access to networks (63%). (n=507 Have personal mobile devices on corporate network) 7%   14%   38%   59%   63%   67%   0%   10%   20%   30%   40%   50%   60%   70%   80%   No  challenges   Finding  agnos:c  security  solu:ons  (i.e.  managing  all  OSes)   Keep  device  opera:ng  system  and  applica:ons  updated   Managing  personal  devices  that  contain  both  corporate  and  personal   data  and  applica:ons   Tracking  and  controlling  access  to  corporate  and  private  networks   Securing  corporate  informa:on   Challenges  with  BYOD   6%   4%   16%   8%   42%   43%   36%   45%   0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%   2012   2013   No  increase   Less  than  2  9mes     Between  2  and  5  9mes       More  than  5  9mes    
  • 6. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 6 Corporate information on personal devices not managed by IT Almost two-thirds, 63%, of companies who have personally owned mobile devices connecting to their corporate networks do not manage the corporate information that resides there. Among those who do manage the information, active-synch policies were the most common (21%), followed by Mobile Device Management (MDM) tools (15%), and secure container (8%). Larger companies were the most likely to manage corporate information on personally owned devices. Very few companies with less than 1000 employees, 17%, use a technical approach to information management on employee’s mobile devices, significantly less than the comparable 66% of companies with more than 5000 employees. (n= 507 Have personal mobile devices on corporate network) 63%   8%   15%   21%   0%   10%   20%   30%   40%   50%   60%   70%   We  do  not  manage  corporate  informa:on  on  employee-­‐ owned  devices   Secure  container   Mobile  Device  Management  (MDM)  tool   Ac:ve-­‐synch  policy   Approach  to  managing  business  data  on  personally  owned  devices   37%   17%   47%   66%   0%   10%   20%   30%   40%   50%   60%   70%   All   Less  than  1000   employees   1000  -­‐  5,000  employees   More  than  5000   employees   IT  manages  the  corporate  informa2on  on  personally   owned  mobile  devices   (By  company  size)  
  • 7. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 7 More types of information on mobile devices today Participants reported an increase in all types of information stored on mobile devices compared to last year. Corporate email, the most common type of corporate information reported, increased from 79% of mobile devices last year to 88% this year. More companies have their most sensitive business information stored on mobile devices. Customer data stored on mobile devices increased from 47% in 2012 to 53% in 2013. Corporate information on mobile devices through business apps installed on mobile devices saw the greatest increase with a 17% rise from 2012 to 2013. Possible loss of corporate information from mobile devices ranked most concerning Mobile security incidents can have a wide range of impacts. Participants were presented with a list of possible impacts and asked to rank them from first to last with the first being the factor that was the most impactful and the last being the factor that was the least impactful. Lost or stolen devices was ranked number 1 as the factor that had the greatest impact on the vulnerability of mobile data, followed by malicious applications downloaded to the mobile device. The high rate of users changing or upgrading their mobile device was ranked last as a factor impacting mobile security. 28%   30%   38%   32%   47%   65%   79%   33%   46%   48%   49%   53%   72%   74%   88%   0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%   Confiden3al  notes   Photos/video   Network  login  creden3als   Corporate  informa3on  via  business  apps   Customer  data   Corporate  calendar*   Contact  informa3on  for  colleagues,  customers,  partners   Corporate  email   Corporate  informa-on  stored  on  mobile  devices   2013   2012   *Not asked in 2012 survey (n=736 Have mobile devices on corporate networks)
  • 8. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 8 Loss of corporate information greatest concern during a mobile security incident Mobile security incidents can have a wide range of impacts. Participants who had mobile devices on their corporate networks, including both personal and business, were presented with a list of possible issues that could occur as a result of a mobile security incident and asked which were most concerning. Possible loss of corporate information was by far the most concerning (94%). The cost of replacing the lost device ranked a distant second (20%). (n=736 Have mobile devices on corporate networks) (n=736 Have mobile devices on corporate networks) Weighted Score 10%   20%   94%   0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%   Compliance  viola8ons  and  fines   (Cost  of  replacing  lost  or  stolen  devices   Lost  or  stolen  informa8on   Concerns  when  a  mobile  security  incident  is  experienced   7.  High  rate  of  users  changing  or  upgrading  their  mobile  device   6.  Lack  of  employee  awareness  about  security  policies   5.  Lack  of  security  patches  from  service  providers   4.  Insecure  web  browsing   3.  Unsecured  Wi-­‐Fi  connecEvity   2.  Malicious  applicaEons  downloaded  to  the  mobile  device   1.  Lost  or  stolen  mobile  devices  with  corporate  data   Ranking  of  factors  impac0ng  the  vulnerability  of  mobile  data  
  • 9. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 9 Mobile security incidents are expensive Once companies have mobile devices, security incidents happen and the costs are substantial. Most companies, 79%, that have mobile devices on their networks have had a mobile security incident in the past year. The majority, 57%, reported that the total costs of their mobile security incidents cost them from $10,000 to more than $500,000 in the past year. These costs included staff time, legal fees, fines, resolution processes, and so on. When security incidents did happen, the cost was most substantial at the largest companies. Among those who work at companies with over 5000 employees, more than half (52%) reported that last year the cost of mobile security incidents exceeded $500,000. However, even SMBs reported that mobile security incidents were very expensive. Almost half of companies with less than 1000 employees, 45%, reported security incidents that cost more than $100,000, a significant amount for a small firm. No  mobile  security   incidents   21%   Less  than  $10,000   22%   $10,000  -­‐  $100,000   15%   $100,000  -­‐  $500,000   13%   $250,000  -­‐  $500,000   13%   More  than  $500,000   16%   Cost  of  mobile  security  incidents  in  the  past  year   (n=736 Have mobile devices on corporate networks) (n=576 Have had mobile security incident in the past year) 36%   23%   12%   19%   19%   14%   18%   23%   8%   17%   18%   14%   10%   18%   52%   0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%   Less  than  1000  employees     1000  -­‐  5,000  employees   More  than  5000  employees   Cost  of  mobile  security  incidents  in  the  past  year   (By  company  size)   Less  than  $10,000   $10,000  -­‐  $100,000   $100,000  -­‐  $250,000   $250,000  -­‐  $500,000   More  than  $500,000  
  • 10. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 10 Android trusted less; Windows Mobile and BlackBerry trusted more for security Participants were asked which of the most common mobile platforms they viewed as being the greatest risk to their corporate security. Android was by far the most frequent platform indicated (49%), followed by Apple/iOS (25%) and Windows Mobile (17%). This question showed a dramatic change from the previous year. Android increased dramatically as the platform perceived to have the greatest security risk. Windows Mobile and BlackBerry both saw the number of IT professionals who viewed this as the most risky platform decrease by almost half. Careless employees seen as a greater security risk than cybercriminals Participants were asked which group of individuals was considered the greatest security risk — careless employees or cybercriminals who intentionally try to steal corporate information. Significantly more said careless employees pose greater security risks (66%) than cybercriminals (34%), which reinforces the importance of implementing a strong combination of technology and security awareness throughout an organization. (n=790 All) (n=790 All) Careless   employees   66%   Cybercriminals   34%   Greater  impact  on  security  risk  of  mobile  devices   12% Decrease 7% Decrease 19% IncreaseNo Change 25% 25% 30% 49% 29% 17% 16% 9% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2012 2013 (2012 vs. 2013) Apple/iOS Android Windows Mobile Blackberry Mobile platform perceived as greatest security risk
  • 11. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 11 IT may not allow use of file-sharing sites, but policy is often not enforced The use of mobile devices has driven the adoption of file-sharing sites such as DropBox, Box, Google Drive and iCloud, which some IT organizations see as a concern for security of corporate data. Participants were asked if employees are allowed to upload and share work information to public file-sharing applications. Organizations are divided on their policies with some allowing all employees to access these sites (35%) and some not allowing any employees (25%). Most allowed some employees while preventing others (40%). However, these policies are not enforced uniformly. Organizations who do have policies that some or all of their employees not use public file-sharing applications were asked whether they thought these policies were followed. Only 38% actually enforce their policies by blocking these sites on the corporate network, while 28% admit that some employees don’t follow the policy. (n=790 All) All  employees  can  use   35%   Some  employees  in   certain  roles       40%   No  employees  can  use   25%   Policy  on  employee  use  of  public  file-­‐sharing  applica6ons   2%   26%   34%   38%   0%   5%   10%   15%   20%   25%   30%   35%   40%   Most  employees  don't  follow  the  policy   Most  employees  follow  the  policy,  but  a  few  don't   We  think  all  our  employees  follow  our  policy,  but  it  is  not   enforced   The  policy  is  definitely  followed  since  we  block  these  sites   from  our  network   Employee  adherence  to  policy  of  not  using    public  file-­‐sharing     (n=512 Those with policies against use of public file-sharing)
  • 12. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS Dimensional Research | June 2013 www.dimensionalresearch.com © 2013 Dimensional Research. All Rights Reserved. Page 12 Survey Methodology An independent database of IT professionals was invited to participate in a web survey on the topic of mobile devices and information security sponsored by Check Point. A total of 790 respondents across the United States, Canada, United Kingdom, Germany, and Japan completed the survey. Each respondent had responsibility for securing company systems. Participants included IT executives, IT managers, and hands-on IT professionals, and represented a wide range of company sizes and industry verticals. This survey is the second in a series of surveys on this topic. This report compares certain results to the results of similar questions asked one year ago. About Dimensional Research Dimensional Research® provides practical marketing research to help technology companies make their customers more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks, increases customer satisfaction, and grows the business. For more information visit www.dimensionalresearch.com. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. IT  execu(ve   31%   IT  manager   40%   Front-­‐line  IT   professional   29%   Par$cipant  job  func$on   Less  than  100   17%   100  -­‐  1000   31%  1000  -­‐  5,000   25%   5,000  -­‐  15,000   16%   More  than  15,000   11%   Company  Size   IT  security  is  my   en.re  job   31%   IT  security  is  part   of  my  job     69%   Responsibility  for  IT  security