SlideShare a Scribd company logo
Is Your Mobile Workforce

Beach Ready?
Are you thinking about using your personal mobile
device to stay connected to work on summer vacation?
Does that productivity boost
come with too much of a risk?
When people use mobile apps
for work, there is a

45% increase in productivity

Watch out! Of the 70M
smartphones lost each year,
only 7% are recovered.1
Here are the most popular places to lose
your phone on vacation.2

25% sightseeing

But there is
a security risk since

23% airport
22% hotel
18% public transportation

80%

12% rental car

of BYOD activity is unmanaged.

Can you bear a data breach at the beach?

Sunscreen won’t
protect your data!
73%
of employees said they access
information that could be considered
sensitive or confidential8

67%

Watch out for pickpockets!
The cost of a mobile data breach will
sink you and your company

174M

don’t use a security solution for
their mobile devices1

records were stolen in data breaches4

59%

Average cost of a breach

$5.5M

report that employees circumvent or
disengage security features such as
passwords and key locks6

51%
experience data loss resulting from
employee use of unsecured mobile
devices6

42%
send work related docs BUT

Major causes of a data breach?7

37%

40%
don’t use complex passwords or
change their passwords regularly1

Malicious attacks

35%

Negligence/Human factor

29%

System glitches

There’s no time to relax when
you’re managing mobile security.
Here are some strategies
that IT departments are
implementing today.3

37%

require employees to lock
screens

24%

use security software

Watch out! Criminals and
hackers don’t go on vacation.

21%

While you’re out travelling and exploring
the world, they may be exploring the
confidential data on your device!

17%

More than 75% of all malicious
code has basically one goal:
to steal your data.

use mobile application
management software
make employees report
issues quickly

11%

restrict downloads

7%

build an internal app store

6%

installed location tracking
software on devices

Top mobile threats by type:

28% collects device data
25% tracks user
24% sends content

A comprehensive approach to mobile security is the only way to be sure
you can fully relax on your vacation and when you get back to the office.
Secure your Devices, Apps and
Content with SAP Mobile Secure.
Learn more at sap.com/mobile/emm.

1 Intuition, Post PC Era; 2012.
2 Huffington Post, Most likely places to lose cell phone traveling; 2013.
3 ReadWrite Survey Results: What A Typical BYOD Program Really Looks Like, 2013.
4 Savid Technologies, Infographic: Mobile Security, 2013.
5 Norton, Cybercrime Report; 2013.
6 PR Newswire, Survey Says 51 Percent of Organizations Lose Data Through Mobile Devices,
59 Percent of Employees Dodge Security Controls; 2013.
7 Bank Info Security, Regulations' Impact on Data Breach Costs by Eric Chabrow; 2013.

©2013 SAP AG. SAP and the SAP logo are trademarks and registered
trademarks of SAP in Germany and several other countries.

More Related Content

More from Ideba

Kaufman Hall Finance Infographic
Kaufman Hall Finance InfographicKaufman Hall Finance Infographic
Kaufman Hall Finance InfographicIdeba
 
Kaufman Hall Education Infographic
Kaufman Hall Education InfographicKaufman Hall Education Infographic
Kaufman Hall Education InfographicIdeba
 
Kaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyKaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyIdeba
 
Microsoft Teams Infographic
Microsoft Teams Infographic Microsoft Teams Infographic
Microsoft Teams Infographic Ideba
 
C4 Database Management Onboarding
C4 Database Management OnboardingC4 Database Management Onboarding
C4 Database Management OnboardingIdeba
 
C4 Database Management Website
C4 Database Management WebsiteC4 Database Management Website
C4 Database Management WebsiteIdeba
 
FINEOS Booth
FINEOS BoothFINEOS Booth
FINEOS BoothIdeba
 
FINEOS Website
FINEOS WebsiteFINEOS Website
FINEOS WebsiteIdeba
 
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Ideba
 
Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Ideba
 
Greenway Health Amicus Case Study
Greenway Health Amicus Case StudyGreenway Health Amicus Case Study
Greenway Health Amicus Case StudyIdeba
 
Greenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyGreenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyIdeba
 
Cortez Health Case Study
Cortez Health Case StudyCortez Health Case Study
Cortez Health Case StudyIdeba
 
Greenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyGreenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyIdeba
 
Greenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicGreenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicIdeba
 
Greenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyGreenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyIdeba
 
Greenway Health Case Study Infographic
Greenway Health Case Study InfographicGreenway Health Case Study Infographic
Greenway Health Case Study InfographicIdeba
 
Ideba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba
 
Ideba Creative Portfolio
Ideba Creative PortfolioIdeba Creative Portfolio
Ideba Creative PortfolioIdeba
 
Fiserv Deposit Growth eBook
Fiserv Deposit Growth eBookFiserv Deposit Growth eBook
Fiserv Deposit Growth eBookIdeba
 

More from Ideba (20)

Kaufman Hall Finance Infographic
Kaufman Hall Finance InfographicKaufman Hall Finance Infographic
Kaufman Hall Finance Infographic
 
Kaufman Hall Education Infographic
Kaufman Hall Education InfographicKaufman Hall Education Infographic
Kaufman Hall Education Infographic
 
Kaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyKaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case Study
 
Microsoft Teams Infographic
Microsoft Teams Infographic Microsoft Teams Infographic
Microsoft Teams Infographic
 
C4 Database Management Onboarding
C4 Database Management OnboardingC4 Database Management Onboarding
C4 Database Management Onboarding
 
C4 Database Management Website
C4 Database Management WebsiteC4 Database Management Website
C4 Database Management Website
 
FINEOS Booth
FINEOS BoothFINEOS Booth
FINEOS Booth
 
FINEOS Website
FINEOS WebsiteFINEOS Website
FINEOS Website
 
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)
 
Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)
 
Greenway Health Amicus Case Study
Greenway Health Amicus Case StudyGreenway Health Amicus Case Study
Greenway Health Amicus Case Study
 
Greenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyGreenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case Study
 
Cortez Health Case Study
Cortez Health Case StudyCortez Health Case Study
Cortez Health Case Study
 
Greenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyGreenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case Study
 
Greenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicGreenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction Infographic
 
Greenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyGreenway Health Cow Creek Case Study
Greenway Health Cow Creek Case Study
 
Greenway Health Case Study Infographic
Greenway Health Case Study InfographicGreenway Health Case Study Infographic
Greenway Health Case Study Infographic
 
Ideba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo Options
 
Ideba Creative Portfolio
Ideba Creative PortfolioIdeba Creative Portfolio
Ideba Creative Portfolio
 
Fiserv Deposit Growth eBook
Fiserv Deposit Growth eBookFiserv Deposit Growth eBook
Fiserv Deposit Growth eBook
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Is Your Mobile Workforce Beach Ready? - SAP Infographic

  • 1. Is Your Mobile Workforce Beach Ready? Are you thinking about using your personal mobile device to stay connected to work on summer vacation? Does that productivity boost come with too much of a risk? When people use mobile apps for work, there is a 45% increase in productivity Watch out! Of the 70M smartphones lost each year, only 7% are recovered.1 Here are the most popular places to lose your phone on vacation.2 25% sightseeing But there is a security risk since 23% airport 22% hotel 18% public transportation 80% 12% rental car of BYOD activity is unmanaged. Can you bear a data breach at the beach? Sunscreen won’t protect your data! 73% of employees said they access information that could be considered sensitive or confidential8 67% Watch out for pickpockets! The cost of a mobile data breach will sink you and your company 174M don’t use a security solution for their mobile devices1 records were stolen in data breaches4 59% Average cost of a breach $5.5M report that employees circumvent or disengage security features such as passwords and key locks6 51% experience data loss resulting from employee use of unsecured mobile devices6 42% send work related docs BUT Major causes of a data breach?7 37% 40% don’t use complex passwords or change their passwords regularly1 Malicious attacks 35% Negligence/Human factor 29% System glitches There’s no time to relax when you’re managing mobile security. Here are some strategies that IT departments are implementing today.3 37% require employees to lock screens 24% use security software Watch out! Criminals and hackers don’t go on vacation. 21% While you’re out travelling and exploring the world, they may be exploring the confidential data on your device! 17% More than 75% of all malicious code has basically one goal: to steal your data. use mobile application management software make employees report issues quickly 11% restrict downloads 7% build an internal app store 6% installed location tracking software on devices Top mobile threats by type: 28% collects device data 25% tracks user 24% sends content A comprehensive approach to mobile security is the only way to be sure you can fully relax on your vacation and when you get back to the office. Secure your Devices, Apps and Content with SAP Mobile Secure. Learn more at sap.com/mobile/emm. 1 Intuition, Post PC Era; 2012. 2 Huffington Post, Most likely places to lose cell phone traveling; 2013. 3 ReadWrite Survey Results: What A Typical BYOD Program Really Looks Like, 2013. 4 Savid Technologies, Infographic: Mobile Security, 2013. 5 Norton, Cybercrime Report; 2013. 6 PR Newswire, Survey Says 51 Percent of Organizations Lose Data Through Mobile Devices, 59 Percent of Employees Dodge Security Controls; 2013. 7 Bank Info Security, Regulations' Impact on Data Breach Costs by Eric Chabrow; 2013. ©2013 SAP AG. SAP and the SAP logo are trademarks and registered trademarks of SAP in Germany and several other countries.