Survey finds disconnect between mobile device use and mobile security preparedness

Nov 08, 2012

While the majority of small business owners allow employees to use mobile devices such as smartphones and tablets, few have taken steps to ensure these devices are kept safe from cyber threats.

According to a recent survey commissioned by AT&T and the Polytechnic Institute of New York University, 90 percent of allow their employees to access work email via , and 41 percent allow employees to use these devices to access business files. Eighty three percent of small businesses allow employees to use personal devices for work.

Only 65 percent reported information and data of wireless devices as a concern, versus 91 percent concerned about computer and online data security. Fewer than one-third (29 percent) have installed anti-virus software on smartphones.

This video is not supported by your browser at this time.

The survey also found that 82 percent of small businesses have taken steps to secure company laptops. In contrast, only 32 percent are taking measures to protect smartphones, and 39 percent to protect tablets.  Of the majority not taking steps to protect these mobile devices, fewer than half (42 percent) have plans to increase security.

"There is a troubling disconnect between who want to keep data safe and the necessary steps to protect it," said Ed Amoroso, Chief Security Officer, AT&T. "With more employees using mobile devices, especially personal devices, business data is increasingly vulnerable to . Protecting critical information can be easy and affordable, and small businesses need to recognize the reality of today's environment – this is a step they can't afford to ignore."

In addition to mobile security questions, the survey also asked business owners whether their business had experienced a cyber or online security incident. Nearly four in 10 (37 percent) reported being the victim of a security breach, such as a virus, mobile malware or phishing, with 21 percent being victimized within the last two years. 

"Small businesses need to better understand their risk profile," said Nair Memon, Professor of Computer Science and Engineering and founding director of The Center for Interdisciplinary Studies in Security and Privacy (CRISSP) at NYU-Poly. "This means treating every device that touches your network, from laptops to smartphones, as vulnerabilities and ensuring that security is built into the equation at every level." 

For additional survey results, please click on this link for the fact sheet.

Explore further: Security CTO to detail Android Fake ID flaw at Black Hat

add to favorites email to friend print save as pdf

Related Stories

Mobile-security services take off

Sep 26, 2011

The prospect of consumers and employees physically losing information-packed mobile devices, or getting them hacked, has become the driver for a red-hot sector of the tech industry: supplying mobile security.

NIST updates guidelines for mobile device security

Jul 11, 2012

The National Institute of Standards and Technology (NIST) has released a proposed update to its guidelines for securing mobile devices—such as smart phones and tablets—that are used by the federal government. NIST ...

Recommended for you

Security CTO to detail Android Fake ID flaw at Black Hat

10 hours ago

Where have you heard this before: A team of security researchers discover a security flaw in Android devices. This is, however, news. This time, experts are talking about a flaw that involves a widespread ...

Chinese smartphone makers win as market swells

12 hours ago

Chinese smartphone makers racked up big gains as the global market for Internet-linked handsets grew to record levels in the second quarter, International Data Corp said Tuesday.

Full appeals court upholds labels on meat packages

12 hours ago

(AP)—A federal appeals court has upheld new government rules that require labels on packaged steaks, ribs and other cuts of meat to say where the animals were born, raised and slaughtered.

User comments : 0