Mobile Security Trends in the Workplace 
June 2014 
1 
By 2016, the number of smartphones is expected to 
surpass the number of people on the planet. Whether 
IT knows it or not, mobile devices are being used in 
the workplace.
2 
Quick Facts about BYOD 
 Gartner predicts that 80% of all user access 
to the enterprise will be via mobile devices 
by 2020 
 38% of companies expect to stop providing 
devices to workers by 2016
3 
Summary of Key Findings 
 64% of IT professionals report that mobile security is a top priority for 2014 
 90% of employees use personal smartphones for work, yet fewer than half of organizations 
have a mobile security policy in place 
 More than half of IT professionals list “securing mobile data” as most important, however only 
13% feel their current solution is effective in doing so 
 71% of employees use 1-5 applications to access corporate data 
 Apple devices have a slight lead over Android devices: 62% versus 53% 
 Employee’s top concerns are privacy (76%) and loss of personal data (82%); however the 
majority of IT professionals are overall unconcerned with employee privacy
Mobile Security is a Top Priority for 2014 
Quick Facts 
 64% of IT professionals rank mobile security as a top concern for 2014 
 36% report that mobile security is not a top 3 priority 
4
Organizations Still Navigating BYOD 
BYOD security partially depends on employee compliance, so the disconnect between the enterprise 
policies and employee knowledge/compliance creates unwanted opportunities for unintended mobile data 
leakage. 
Quick Facts 
 90% of employees use personal smartphones and 35% use personal tablets at work 
 40% of employees use two or more devices at work 
Yet… 
 Only 40% of IT professionals have a BYOD policy in place 
 An alarming 33% of employees do not know whether or not their organization has a BYOD policy in 
5 
place 
 Of those that have some knowledge of their organization’s BYOD policy, 40% complain about the policy, 
and 6% percent admit to blatant disregard for the policy
Beyond the Device: Focus on Applications 
While the entrance of personal devices in the workplace raises concern over the security of corporate data, the 
applications used to modify and move this data on mobile devices compounds that concern. Unfortunately, 
without insight into which apps employees are actually using, IT really has no way of knowing what to secure, or 
how. 
Quick Facts 
 30.5% of IT professionals believe that none of their employees are using unapproved apps 
 17% of IT professionals believe that the majority or all of their employees using unapproved apps 
 71% of employees use 1-5 apps to access or modify corporate data on their device 
6
Traditional Mobile Security Solutions Miss the Big Picture 
… 
It’s About the Data 
Quick Facts 
 56% of IT professionals list “securing mobile data” as the most important success criteria for mobile 
security 
…Yet only 13% feel that their current mobile security solutions are effectively securing mobile data 
 41% of IT professionals report “reducing data loss” as an important criterion 
…Yet only 13% feel that their current solutions are effectively reducing data loss 
7
Apple vs. Android in the Workplace 
IT needs to be able to secure both types of devices in today’s BYOD mobile landscape 
Quick Facts 
While iOS devices (62%) have a slight lead over Android devices (53%) in the workplace, the combination 
of smartphones and tablets have created a fairly even playing field. 
8
Times are Changing: Security vs. Privacy 
When asked to compare their perspective on employee privacy issues now versus five years ago, there 
is a clear shift. Today, there is a much greater balance between mitigating risk and addressing employee 
concerns and privacy. 
Quick Facts 
 Five years ago, 30%of IT professionals would have said “it’s all about risk mitigation. I don’t factor in 
employee concerns.” Today, only 17% take that stance. 
 The majority of IT professionals surveyed are overall unconcerned with employee privacy 
 35% put employee needs on par with security concerns 
 17% not factoring employees’ need at all. 
9
10 
Employees’ Top Concerns 
Employees thought differently… 
Quick Facts 
 Device wipes removing personal data (82%) 
 Invasion of Privacy (76%) 
 Restricted App Access a distant third (20%) 
While technology solutions are part of the mobile security success equation, employee compliance and 
participation is also key. Enterprises that take employee concerns into account will achieve better 
compliance.
The results of this survey further underscores the need for IT to listen to the concerns of the end user. By 
ignoring or downplaying employee concerns over privacy, IT is all but ensuring that these users will continue 
to operate outside the bounds of IT, and further put corporate data at risk – the very thing IT is most concerned 
about. 
The Solution? 
 Continue to audit employee device and app usage for work and create and tune mobile policies 
11 
accordingly. 
 Once aligned, employees will gain the tools needed to work most efficiently, while IT keeps corporate data 
secure.
12 
For more information 
 Follow Bluebox on Twitter @blueboxsec 
 Subscribe to the Bluebox blog 
 Visit our website at http://www.bluebox.com

Mobile Security Trends in the Workplace

  • 1.
    Mobile Security Trendsin the Workplace June 2014 1 By 2016, the number of smartphones is expected to surpass the number of people on the planet. Whether IT knows it or not, mobile devices are being used in the workplace.
  • 2.
    2 Quick Factsabout BYOD  Gartner predicts that 80% of all user access to the enterprise will be via mobile devices by 2020  38% of companies expect to stop providing devices to workers by 2016
  • 3.
    3 Summary ofKey Findings  64% of IT professionals report that mobile security is a top priority for 2014  90% of employees use personal smartphones for work, yet fewer than half of organizations have a mobile security policy in place  More than half of IT professionals list “securing mobile data” as most important, however only 13% feel their current solution is effective in doing so  71% of employees use 1-5 applications to access corporate data  Apple devices have a slight lead over Android devices: 62% versus 53%  Employee’s top concerns are privacy (76%) and loss of personal data (82%); however the majority of IT professionals are overall unconcerned with employee privacy
  • 4.
    Mobile Security isa Top Priority for 2014 Quick Facts  64% of IT professionals rank mobile security as a top concern for 2014  36% report that mobile security is not a top 3 priority 4
  • 5.
    Organizations Still NavigatingBYOD BYOD security partially depends on employee compliance, so the disconnect between the enterprise policies and employee knowledge/compliance creates unwanted opportunities for unintended mobile data leakage. Quick Facts  90% of employees use personal smartphones and 35% use personal tablets at work  40% of employees use two or more devices at work Yet…  Only 40% of IT professionals have a BYOD policy in place  An alarming 33% of employees do not know whether or not their organization has a BYOD policy in 5 place  Of those that have some knowledge of their organization’s BYOD policy, 40% complain about the policy, and 6% percent admit to blatant disregard for the policy
  • 6.
    Beyond the Device:Focus on Applications While the entrance of personal devices in the workplace raises concern over the security of corporate data, the applications used to modify and move this data on mobile devices compounds that concern. Unfortunately, without insight into which apps employees are actually using, IT really has no way of knowing what to secure, or how. Quick Facts  30.5% of IT professionals believe that none of their employees are using unapproved apps  17% of IT professionals believe that the majority or all of their employees using unapproved apps  71% of employees use 1-5 apps to access or modify corporate data on their device 6
  • 7.
    Traditional Mobile SecuritySolutions Miss the Big Picture … It’s About the Data Quick Facts  56% of IT professionals list “securing mobile data” as the most important success criteria for mobile security …Yet only 13% feel that their current mobile security solutions are effectively securing mobile data  41% of IT professionals report “reducing data loss” as an important criterion …Yet only 13% feel that their current solutions are effectively reducing data loss 7
  • 8.
    Apple vs. Androidin the Workplace IT needs to be able to secure both types of devices in today’s BYOD mobile landscape Quick Facts While iOS devices (62%) have a slight lead over Android devices (53%) in the workplace, the combination of smartphones and tablets have created a fairly even playing field. 8
  • 9.
    Times are Changing:Security vs. Privacy When asked to compare their perspective on employee privacy issues now versus five years ago, there is a clear shift. Today, there is a much greater balance between mitigating risk and addressing employee concerns and privacy. Quick Facts  Five years ago, 30%of IT professionals would have said “it’s all about risk mitigation. I don’t factor in employee concerns.” Today, only 17% take that stance.  The majority of IT professionals surveyed are overall unconcerned with employee privacy  35% put employee needs on par with security concerns  17% not factoring employees’ need at all. 9
  • 10.
    10 Employees’ TopConcerns Employees thought differently… Quick Facts  Device wipes removing personal data (82%)  Invasion of Privacy (76%)  Restricted App Access a distant third (20%) While technology solutions are part of the mobile security success equation, employee compliance and participation is also key. Enterprises that take employee concerns into account will achieve better compliance.
  • 11.
    The results ofthis survey further underscores the need for IT to listen to the concerns of the end user. By ignoring or downplaying employee concerns over privacy, IT is all but ensuring that these users will continue to operate outside the bounds of IT, and further put corporate data at risk – the very thing IT is most concerned about. The Solution?  Continue to audit employee device and app usage for work and create and tune mobile policies 11 accordingly.  Once aligned, employees will gain the tools needed to work most efficiently, while IT keeps corporate data secure.
  • 12.
    12 For moreinformation  Follow Bluebox on Twitter @blueboxsec  Subscribe to the Bluebox blog  Visit our website at http://www.bluebox.com