Research: 2013 State Of Mobile Security
2013 State Of Mobile Security
Company data on personal devices is a done deal. So is risk: In its threat report for the first quarter of 2013, McAfee says it has 50,926 malware instances on file, with 28% of that volume arriving in 2013. In all of 2011, the company gathered only 792 samples.
Among the 424 respondents to our InformationWeek 2013 Mobile Security Survey, all of whom are involved with mobile device management, policy development and/or security at their organizations, 68% support bring your own device in some form, and an additional 20% are in the process of developing BYOD policies. Other data points:
>> 78% say their top mobile security concern is lost/stolen devices, well ahead of the No. 2 worry, users forwarding corporate information to cloud-based storage services (cited by 36%)
>> 46% require a power-on password as an authentication mechanism for mobile devices that access enterprise data/networks
>> 45% let users bring in any device, and they let it on the network as long as the user agrees to certain policies; no enforcement
>> 45% have had a data loss within the past 12 months; 11% of them were required to publicly disclose the loss
In this report, we:
>> Examine the business and technology trends pushing the move to mobility.
>> Provide recommendations on building a policy and enforcement program that can adapt to explosive growth, changing mobile technology and a dynamic mix of client devices.
Respondent breakdown: 32% have 5,000 or more employees; 22% are over 10,000. Financial services, government, manufacturing and education are well-represented, and 34% are IT director/manager or IT executive management (C-level/VP) level. (R6890613)
Survey Name InformationWeek 2013 Mobile Security Survey
Survey Date April 2013
Region North America
Number of Respondents 424
Purpose To examine mobile security technology trends and strategies.
Methodology InformationWeek surveyed business technology decision-makers involved with mobile device management, policy development and/or security at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers.