Presentation is loading. Please wait.

Presentation is loading. Please wait.

InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.

Similar presentations


Presentation on theme: "InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved."— Presentation transcript:

1 InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

2 It's not that smartphone and tablet hardware is disposable, exactly. But it's not nearly as important to the 371 business technology professionals responding to our 2014 InformationWeek Mobile Security Survey as the data in device memory. Securing company data residing on mobile devices is rated very important by 68%, 21 points ahead of securing devices themselves using antivirus/anti-malware or MDM client software, and 72% say their top mobile security concern is data loss due to lost or stolen devices. Other data points from our survey: >> 50% allow all corporate-owned devices to access social media sites and use related apps; 31% limit that access to certain departments. Just 19% ban it completely. >> 46% feel only moderately confident that their mobile security controls are effective at protecting data. >> 40% worry about users forwarding corporate data to cloud-based storage services Respondent breakdown: Respondents screened in by indicating involvement with mobile device management, policy development, and/or security at their organizations. Forty-one percent have 5,000 or more employees; 28% are over 10,000. Government, financial services, and healthcare are well-represented, and 36% are IT director/manager or IT executive management (C-level/VP) level. Want more? Visit InformationWeek ReportsInformationWeek Reports Executive Summary v © 2014 Property of UBM Tech; All Rights Reserved

3 Top Concern: Stolen Devices © 2014 Property of UBM Tech; All Rights Reserved

4 Top priority: securing company data on mobile devices © 2014 Property of UBM Tech; All Rights Reserved

5 Nearly half report missing devices © 2014 Property of UBM Tech; All Rights Reserved

6 Most did not require public disclosure © 2014 Property of UBM Tech; All Rights Reserved

7 Secure corporate data on mobile device top reason for policy © 2014 Property of UBM Tech; All Rights Reserved

8 Many companies allow personal mobile devices for work © 2014 Property of UBM Tech; All Rights Reserved

9 Personal device policies vary © 2014 Property of UBM Tech; All Rights Reserved

10 Do companies reimburse device purchases? © 2014 Property of UBM Tech; All Rights Reserved

11 Do companies reimburse monthly phone bill? © 2014 Property of UBM Tech; All Rights Reserved

12 More company-supplied devices on corporate network © 2014 Property of UBM Tech; All Rights Reserved

13 Data storage on company-provided mobile device © 2014 Property of UBM Tech; All Rights Reserved

14 Data storage on personal mobile device © 2014 Property of UBM Tech; All Rights Reserved

15 Personal apps allowed on company-owned device? © 2014 Property of UBM Tech; All Rights Reserved

16 Personal apps on personal device that accesses network? © 2014 Property of UBM Tech; All Rights Reserved

17 Who’s responsible for mobile security policy? © 2014 Property of UBM Tech; All Rights Reserved

18 Does security training include mobile use? © 2014 Property of UBM Tech; All Rights Reserved

19 Most are confident of security controls © 2014 Property of UBM Tech; All Rights Reserved

20 Authentication: username/password most common © 2014 Property of UBM Tech; All Rights Reserved

21 Passwords: more than half require frequent changes © 2014 Property of UBM Tech; All Rights Reserved

22 Data in transit: VPN secure tunnel most common © 2014 Property of UBM Tech; All Rights Reserved

23 Most corporate devices allow public wireless access © 2014 Property of UBM Tech; All Rights Reserved

24 Half allow all corporate devices to access social media © 2014 Property of UBM Tech; All Rights Reserved

25 Data encryption methods vary © 2014 Property of UBM Tech; All Rights Reserved

26 Why no encryption? © 2014 Property of UBM Tech; All Rights Reserved

27 Govt. agencies: Is data classified? © 2014 Property of UBM Tech; All Rights Reserved

28 Govt. agencies: data leak prevention used? © 2014 Property of UBM Tech; All Rights Reserved

29 Govt. policies: internal vs. federal/state requirements © 2014 Property of UBM Tech; All Rights Reserved

30 Govt.: most users do not circumvent security controls © 2014 Property of UBM Tech; All Rights Reserved

31 Govt.: Do users carry multiple devices? © 2014 Property of UBM Tech; All Rights Reserved

32 Job titles: most are IT managers/staff © 2014 Property of UBM Tech; All Rights Reserved

33 Wide range of industries © 2014 Property of UBM Tech; All Rights Reserved

34 Annual revenues vary © 2014 Property of UBM Tech; All Rights Reserved

35 Many large companies © 2014 Property of UBM Tech; All Rights Reserved

36 Survey Name InformationWeek 2014 Mobile Security Survey Survey Date March 2014 Region North America Number of Respondents 371 Purpose To examine mobile security technology trends and strategies Methodology InformationWeek surveyed business technology decision-makers involved with mobile device management, policy development, and/or security at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers. Want more? Visit InformationWeek ReportsInformationWeek Reports Research Synopsis © 2014 Property of UBM Tech; All Rights Reserved

37


Download ppt "InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved."

Similar presentations


Ads by Google