The survey found that respondents expected to use their smartphones for both work and personal activities like emailing, calling, and social networking during the holidays. Most anticipated work activities would involve sensitive data. While security concerns like loss/theft and malware were top concerns, many users are not careful about app permissions or using security software. The report recommends encrypting data, using security software, and focusing on information protection over devices.
As the world becomes more connected, security needs to be at the forefront of people’s minds as they use mobile devices to live every day life. Here are 5 things to consider when using your mobile device.
More and more organization employees are required to work outside the office using tablets, laptops and smartphones. These technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Mobile technologies collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. This webinar will discuss the risks faced by small to medium size organizations that require employees to work remotely. We will also discuss mitigation strategies.
As the world becomes more connected, security needs to be at the forefront of people’s minds as they use mobile devices to live every day life. Here are 5 things to consider when using your mobile device.
More and more organization employees are required to work outside the office using tablets, laptops and smartphones. These technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Mobile technologies collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. This webinar will discuss the risks faced by small to medium size organizations that require employees to work remotely. We will also discuss mitigation strategies.
Lookout analyzes more than 30,000 apps every day. Although most are safe, there are a few categories to watch out for. Here's Lookout's list of mobile threats to avoid.
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
Instead of assessing what the next 365 days will bring, we’re looking forward with a three year rolling window. We’ll re-examine every year, highlighting what we’re still bullish on, and where our predictions no longer seem likely.
Symantec Mobile Security Whitepaper June 2011Symantec
Symantec Corp. announced the publication of "A Window Into Mobile Device Security: Examining the security approaches employed in Apple’s iOS and Google’s Android." This whitepaper conducts an in-depth, technical evaluation of the two predominant mobile platforms, Apple’s iOS and Google’s Android, in an effort to help corporations understand the security risks of deploying these devices in the enterprise.
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]Litmus
More business prospects are opening email on mobile devices than through traditional webmail on a browser. It’s becoming increasingly imperative to provide the right content, in the right format, at the right time.
Justine Jordan and Janelle Johnson provide an overview of what marketers need to know about making email more mobile-friendly, as well as some simple steps to take in managing email marketing campaigns.
Topics include:
How to make email more mobile friendly
Best practices for mobile email
The future of mobile email
And more!
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.
Multiscreen Email Design: Lessons from the ProsLitmus
Recently it seems as if mobile email has become the new hot topic among digital marketers. Much of this conversation centers around the on-screen experience: What's the best way to design an email so it renders well and drives opens, clicks and most importantly conversions and other desired goals on the tiny screen of a smartphone, mid-sized tablet and larger monitor on a laptop or desktop PC? While certainly important questions to ask, this is only one aspect of an effective mobile and multiscreen email marketing strategy. Before you make over the email message itself, you must first work out many other aspects of your multiscreen strategy.
In this Webinar, Loren McDonald will assemble a team of some of the smartest thinkers in the mobile/multiscreen email marketing design arena. Together they will tackle some of the toughest questions and offer real-life advice for getting multiscreen email right.
Among the specific topics will include the following:
Learning the implications of each major screen size and device
Determining what devices your subscriber base is using and how and where they are converting
Discussing the different types of design approaches, such as responsive and scalable, and which is the best fit based on your resources and expertise
Creating a consistent user experience across email and Web/landing pages
Examples and key best practices
Communicating with your designer and programmer
Testing, learning, optimization and measurement/analysis
Future trends and predictions - where is it all going
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
Presentation at the 2016 Big Sky Developers' Conference.
Overview of the dismal state of security on the Web, some suggestions for better app development processes to mitigate problems.
Lookout analyzes more than 30,000 apps every day. Although most are safe, there are a few categories to watch out for. Here's Lookout's list of mobile threats to avoid.
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
Instead of assessing what the next 365 days will bring, we’re looking forward with a three year rolling window. We’ll re-examine every year, highlighting what we’re still bullish on, and where our predictions no longer seem likely.
Symantec Mobile Security Whitepaper June 2011Symantec
Symantec Corp. announced the publication of "A Window Into Mobile Device Security: Examining the security approaches employed in Apple’s iOS and Google’s Android." This whitepaper conducts an in-depth, technical evaluation of the two predominant mobile platforms, Apple’s iOS and Google’s Android, in an effort to help corporations understand the security risks of deploying these devices in the enterprise.
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]Litmus
More business prospects are opening email on mobile devices than through traditional webmail on a browser. It’s becoming increasingly imperative to provide the right content, in the right format, at the right time.
Justine Jordan and Janelle Johnson provide an overview of what marketers need to know about making email more mobile-friendly, as well as some simple steps to take in managing email marketing campaigns.
Topics include:
How to make email more mobile friendly
Best practices for mobile email
The future of mobile email
And more!
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.
Multiscreen Email Design: Lessons from the ProsLitmus
Recently it seems as if mobile email has become the new hot topic among digital marketers. Much of this conversation centers around the on-screen experience: What's the best way to design an email so it renders well and drives opens, clicks and most importantly conversions and other desired goals on the tiny screen of a smartphone, mid-sized tablet and larger monitor on a laptop or desktop PC? While certainly important questions to ask, this is only one aspect of an effective mobile and multiscreen email marketing strategy. Before you make over the email message itself, you must first work out many other aspects of your multiscreen strategy.
In this Webinar, Loren McDonald will assemble a team of some of the smartest thinkers in the mobile/multiscreen email marketing design arena. Together they will tackle some of the toughest questions and offer real-life advice for getting multiscreen email right.
Among the specific topics will include the following:
Learning the implications of each major screen size and device
Determining what devices your subscriber base is using and how and where they are converting
Discussing the different types of design approaches, such as responsive and scalable, and which is the best fit based on your resources and expertise
Creating a consistent user experience across email and Web/landing pages
Examples and key best practices
Communicating with your designer and programmer
Testing, learning, optimization and measurement/analysis
Future trends and predictions - where is it all going
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
Presentation at the 2016 Big Sky Developers' Conference.
Overview of the dismal state of security on the Web, some suggestions for better app development processes to mitigate problems.
Social Networking while at Work - July 2010Symantec
Symantec surveyed 350 people about their social networking habits while at work.
Among the funnier results, we learned that 1 in 10 employees takes their cell phone with them to the bathroom to check social media. Some respondents would even forego a bathroom break, rather than give up their social media!
Fifty-two percent of respondents said that a company’s presence on social media positively impacts their opinion of the company and 32 percent of respondents would think twice about working for a company that banned them from accessing a social network at work.
Multiscreen mobile email design strategy silverpopSilverpop
Webinar held on February 26, 2013 discussing the challenges of designing emails in a mobile and multiscreen world; outlines the different design approaches; shares tips/best practices. Webinar features Justine Jordan of Litmus; Brian Sisolak of Trilogy Interactive and Loren McDonald, Silverpop
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
Learn how to protect your data during Symantec's National Cyber Security Awareness Month webinar with the Identity Theft Resource Center and Infolock.To watch on demand https://symc.ly/2VMMWQX.
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
Symantec, TechSoup and the Michigan Small Business Development Center share how to apply added layers of security to your devices and online accounts. Watch on-demand recording here: https://symc.ly/33ifcxo.
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
View this webinar from Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day.
Watch on demand here: https://symc.ly/2nLyXyB
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
Experts from Symantec and MITRE explore the latest research and best practices for detecting targeted ransomware in your environment.
Watch on-demand webinar here: https://symc.ly/2L7ESFI.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying CASB. Watch here: https://symc.ly/2QTyUec.
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
This webinar to shares insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment. Watch here: https://symc.ly/2W52MoA
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
2019 Symantec Internet Security Threat Report (ISTR): The New Threat Landscape presented by Kevin Haley, Director Product Management, Security Technology & Response, Symantec. Watch webinar recording here: https://symc.ly/2FJ9T18.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
Gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it. Watch the original webinar here https://www.symantec.com/about/webcasts?commid=347274.
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
First-hand insights on the newest cloud-delivered endpoint security solutions. Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research. Listen here: https://symc.ly/2UY2TlS.
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear. Watch Webinar here: https://symc.ly/2WyPD8I
2. Methodology
• Survey conducted via Zoomerang
• 117 respondents
• Respondents recruited through social media channels
• Only respondents using a smartphone in connection with
employment counted
2
3. Key Findings
• Work-related and personal emailing; personal calls and texting;
surfing the Web; and social networking are the most expected
activities during the holidays
• Surprisingly, online shopping ranked near the bottom of the list
• The majority said work-related activities done on smartphones
while out of the office will involve sensitive or confidential data
• More than twice as many respondents very likely to open a text
message from an unknown sender as opposed to those very
likely to open an unsolicited email
3
4. Key Findings
• The majority pay little attention to license agreements and the
permissions they are giving when downloading apps
• Number one smartphone security concern is loss or theft;
mobile malware ranks number two
• The majority are aware smartphone security product exist, but
do not use them
4
5. Which of the following do you expect to use your smartphone
for while taking time off from work in connection to the
upcoming holiday season?
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Work-related email 81%
Personal email 77%
Work-related phone calls 64%
Personal phone calls 81%
Work-related SMS texting 48%
Personal SMS texting 74%
Work-related calendaring 57%
Personal calendaring 45%
Surfing the Web 68%
Online shopping 20%
Downloading apps 44%
Social networking (i.e. Twitter, Facebook, LinkedIn) 68%
Accessing a work-related network (i.e. an intranet or network drive) 10%
Using work-related applications 13%
Viewing/modifying work-related documents (i.e. word processing… 17%
I do not plan on using my smartphone during my time off from work 5%
6. During your time off work around the upcoming holiday season,
what percentage of time spent on your smartphone do you
anticipate you will be doing work-related activities versus
personal activities?
0% 10% 20% 30% 40% 50% 60%
100% work-related, 0% personal 8%
75% work-related, 25% personal 17%
50% work-related, 50% personal 16%
25% work-related, 75% personal 50%
0% work-related, 100% personal 10%
7. Do you anticipate any of the work-related activities you expect
to do on your smartphone while taking time off from work for
the upcoming holiday season will involve sensitive or
confidential information?
No
38%
Yes
62%
8. How likely are you to open an SMS text message on your
smartphone from an unknown sender?
0% 5% 10% 15% 20% 25% 30% 35%
Very likely 29%
Somewhat likely 19%
Somewhat unlikely 20%
Very unlikely 32%
How likely are you to open an email message on your
smartphone from an unknown sender?
0% 5% 10% 15% 20% 25% 30% 35% 40%
Very likely 14%
Somewhat likely 25%
Somewhat unlikely 25%
Very unlikely 37%
9. When downloading apps for your smartphone, how closely do
you pay attention to license agreements, including permissions
requested by the app to access data and services - such as the
GPS - on your phone?
0% 5% 10% 15% 20% 25% 30% 35% 40%
I pay very close attention and read the license agreements carefully
to determine what data and services I am giving the app permission 18%
to access on my smartphone.
I scan the license agreements, but don't pay very close attention to
them or what data and services I am giving the app permission to 33%
access on my smartphone.
I accept the license agreements without reading them, assuming it
is safe to give the app permission to access any data and services 35%
on my smartphone.
I do not download apps on my smartphone. 14%
10. Most smartphones have a "lock" feature that prevents the
accidental pressing of keys and also unauthorized access. Do
you use the "lock" feature of your smartphone?
No
18%
Yes
82%
Have you configured your smartphone to require a password to
"unlock" the device?
No
19%
Yes
81%
11. Please rank the following smartphone security issues based on
your level of concern for each, with one being the most
concerning and three the least concerning.
80%
70% 68%
60% 58%
56%
50%
1
40%
2
32%
3
30%
23%
21% 21%
20%
12%
9%
10%
0%
Loss/Theft Malware SMS text phishing ("SMShing")
12. If your smartphone were lost or stolen, on which of the
following would you place greater value?
The device itself
(hardware)
The data stored 44%
on the device
56%
13. Did you know that there are mobile security software solutions
available from vendors such as Symantec to protect your
smartphone?
No
37%
Yes
63%
Do you use third-party mobile security software on your
smartphone?
Yes
23%
No
77%
14. Which of the following characterizes your overall opinion of
smartphone security software?
0% 10% 20% 30% 40% 50% 60%
There is no need for smartphone security software, and
3%
there will not be a need in the foreseeable future.
Smartphone security software is unnecessary at this point
19%
in time, but perhaps it will be more needed in the future.
Smartphone security software is beneficial, but not
50%
essential.
Smartphone security software is essential. 28%
16. Recommendations
• Encrypt the data on mobile devices
• If at all possible, use smartphone security software on all mobile
endpoints
• Make sure all software is up to date
• Use caution when enabling Bluetooth connections
• Users should be aware of their surroundings when accessing
sensitive information
• Each mobile device should be password protected
• Focus on protecting information as opposed to focusing on the
devices