InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

2014 IT Salary Survey: BI/Analytics Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Government Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 State of the Data Center Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek Next-Generation IT Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
PewInternet.org Use of digital technology by different income groups The current state of digital differences Georgetown University Public Policy Forum.
2013 InformationWeek 500 Executive Survey Research Findings Innovation That Gets Results September 2013 © 2013 Property of UBM Tech; All Rights Reserved.
Conducted by Phase II Quantitative Study Sept, 2001.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
PRODUCT FOCUS 5/27/14 – 6/6/14 INTRODUCTION Our Product Focus for the next two weeks is CompTIA. CompTIA is most well known for serving as the backbone.
1 Cybersecurity Research Prepared for © Harris Interactive January 2013.
Background This report summarizes research to understand consumer comprehension and opinions of online privacy protection. This research was conducted.
Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
2014 State of Storage Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Hybrid Cloud Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
2014 Analytics, BI, and Information Management Research Findings © 2013 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Application Development Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Healthcare Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 State of Unified Communications Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Backup Technologies Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Enterprise Project Management Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Third Annual Shopping on the Job: ISACA’s Online Holiday Shopping and Workplace Internet Safety Survey Commissioned by ISACA ( November 2010.
2014 IT Salary Survey: Banking Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 US IT Salary Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 State of Database Technology Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Networking Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Insurance Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Security Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Used by employees who work remotely. Diary Management Software.
New Data Regulation Law 201 CMR TJX Video.
2014 IT Salary Survey: Executives Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Tech Made Simple: Boosting Your Business Using Technology.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
InformationWeek 2014 Strategic CIO Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Security considerations for mobile devices in GoRTT
Module 1: The Basics Ocean Referrals Easily find specialists and allied health professionals for eReferrals Ocean Studies Administer patient surveys.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BARRY JINKS President & CEO March 22, 2011 President & CEO March 22, 2011.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
STRONGER COMPANIES. STRONGER COMMUNITIES Sponsored by: Co-sponsored by: Presented by: Disaster Relief Programs & Practices: A Study of Corporate Community.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
The State of Computer & Data Security in Corporations Independent Survey.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
How Mobile Transforms the Enterprise
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
2014 IT Budget Outlook Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Microsoft Collaboration Survey Research Results Survey of Business and Technology Decision-Makers.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
The time to address enterprise mobility is now
COVER.
IT & Security Training Skills.
IBM Workplace Support Services: Survey Data Overview
IBM Data Center Tech Support Survey Results
Topic 12: Virtual Private Networks
Presentation transcript:

InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

It's not that smartphone and tablet hardware is disposable, exactly. But it's not nearly as important to the 371 business technology professionals responding to our 2014 InformationWeek Mobile Security Survey as the data in device memory. Securing company data residing on mobile devices is rated very important by 68%, 21 points ahead of securing devices themselves using antivirus/anti-malware or MDM client software, and 72% say their top mobile security concern is data loss due to lost or stolen devices. Other data points from our survey: >> 50% allow all corporate-owned devices to access social media sites and use related apps; 31% limit that access to certain departments. Just 19% ban it completely. >> 46% feel only moderately confident that their mobile security controls are effective at protecting data. >> 40% worry about users forwarding corporate data to cloud-based storage services Respondent breakdown: Respondents screened in by indicating involvement with mobile device management, policy development, and/or security at their organizations. Forty-one percent have 5,000 or more employees; 28% are over 10,000. Government, financial services, and healthcare are well-represented, and 36% are IT director/manager or IT executive management (C-level/VP) level. Want more? Visit InformationWeek ReportsInformationWeek Reports Executive Summary v © 2014 Property of UBM Tech; All Rights Reserved

Top Concern: Stolen Devices © 2014 Property of UBM Tech; All Rights Reserved

Top priority: securing company data on mobile devices © 2014 Property of UBM Tech; All Rights Reserved

Nearly half report missing devices © 2014 Property of UBM Tech; All Rights Reserved

Most did not require public disclosure © 2014 Property of UBM Tech; All Rights Reserved

Secure corporate data on mobile device top reason for policy © 2014 Property of UBM Tech; All Rights Reserved

Many companies allow personal mobile devices for work © 2014 Property of UBM Tech; All Rights Reserved

Personal device policies vary © 2014 Property of UBM Tech; All Rights Reserved

Do companies reimburse device purchases? © 2014 Property of UBM Tech; All Rights Reserved

Do companies reimburse monthly phone bill? © 2014 Property of UBM Tech; All Rights Reserved

More company-supplied devices on corporate network © 2014 Property of UBM Tech; All Rights Reserved

Data storage on company-provided mobile device © 2014 Property of UBM Tech; All Rights Reserved

Data storage on personal mobile device © 2014 Property of UBM Tech; All Rights Reserved

Personal apps allowed on company-owned device? © 2014 Property of UBM Tech; All Rights Reserved

Personal apps on personal device that accesses network? © 2014 Property of UBM Tech; All Rights Reserved

Who’s responsible for mobile security policy? © 2014 Property of UBM Tech; All Rights Reserved

Does security training include mobile use? © 2014 Property of UBM Tech; All Rights Reserved

Most are confident of security controls © 2014 Property of UBM Tech; All Rights Reserved

Authentication: username/password most common © 2014 Property of UBM Tech; All Rights Reserved

Passwords: more than half require frequent changes © 2014 Property of UBM Tech; All Rights Reserved

Data in transit: VPN secure tunnel most common © 2014 Property of UBM Tech; All Rights Reserved

Most corporate devices allow public wireless access © 2014 Property of UBM Tech; All Rights Reserved

Half allow all corporate devices to access social media © 2014 Property of UBM Tech; All Rights Reserved

Data encryption methods vary © 2014 Property of UBM Tech; All Rights Reserved

Why no encryption? © 2014 Property of UBM Tech; All Rights Reserved

Govt. agencies: Is data classified? © 2014 Property of UBM Tech; All Rights Reserved

Govt. agencies: data leak prevention used? © 2014 Property of UBM Tech; All Rights Reserved

Govt. policies: internal vs. federal/state requirements © 2014 Property of UBM Tech; All Rights Reserved

Govt.: most users do not circumvent security controls © 2014 Property of UBM Tech; All Rights Reserved

Govt.: Do users carry multiple devices? © 2014 Property of UBM Tech; All Rights Reserved

Job titles: most are IT managers/staff © 2014 Property of UBM Tech; All Rights Reserved

Wide range of industries © 2014 Property of UBM Tech; All Rights Reserved

Annual revenues vary © 2014 Property of UBM Tech; All Rights Reserved

Many large companies © 2014 Property of UBM Tech; All Rights Reserved

Survey Name InformationWeek 2014 Mobile Security Survey Survey Date March 2014 Region North America Number of Respondents 371 Purpose To examine mobile security technology trends and strategies Methodology InformationWeek surveyed business technology decision-makers involved with mobile device management, policy development, and/or security at North American companies. The survey was conducted online, and respondents were recruited via an invitation containing an embedded link to the survey. The invitation was sent to qualified InformationWeek subscribers. Want more? Visit InformationWeek ReportsInformationWeek Reports Research Synopsis © 2014 Property of UBM Tech; All Rights Reserved