Survey finds disconnect between mobile device use and mobile security preparedness

Nov 08, 2012

While the majority of small business owners allow employees to use mobile devices such as smartphones and tablets, few have taken steps to ensure these devices are kept safe from cyber threats.

According to a recent survey commissioned by AT&T and the Polytechnic Institute of New York University, 90 percent of allow their employees to access work email via , and 41 percent allow employees to use these devices to access business files. Eighty three percent of small businesses allow employees to use personal devices for work.

Only 65 percent reported information and data of wireless devices as a concern, versus 91 percent concerned about computer and online data security. Fewer than one-third (29 percent) have installed anti-virus software on smartphones.

This video is not supported by your browser at this time.

The survey also found that 82 percent of small businesses have taken steps to secure company laptops. In contrast, only 32 percent are taking measures to protect smartphones, and 39 percent to protect tablets.  Of the majority not taking steps to protect these mobile devices, fewer than half (42 percent) have plans to increase security.

"There is a troubling disconnect between who want to keep data safe and the necessary steps to protect it," said Ed Amoroso, Chief Security Officer, AT&T. "With more employees using mobile devices, especially personal devices, business data is increasingly vulnerable to . Protecting critical information can be easy and affordable, and small businesses need to recognize the reality of today's environment – this is a step they can't afford to ignore."

In addition to mobile security questions, the survey also asked business owners whether their business had experienced a cyber or online security incident. Nearly four in 10 (37 percent) reported being the victim of a security breach, such as a virus, mobile malware or phishing, with 21 percent being victimized within the last two years. 

"Small businesses need to better understand their risk profile," said Nair Memon, Professor of Computer Science and Engineering and founding director of The Center for Interdisciplinary Studies in Security and Privacy (CRISSP) at NYU-Poly. "This means treating every device that touches your network, from laptops to smartphones, as vulnerabilities and ensuring that security is built into the equation at every level." 

For additional survey results, please click on this link for the fact sheet.

Explore further: Voice, image give clues in hunt for Foley's killer

add to favorites email to friend print save as pdf

Related Stories

Mobile-security services take off

Sep 26, 2011

The prospect of consumers and employees physically losing information-packed mobile devices, or getting them hacked, has become the driver for a red-hot sector of the tech industry: supplying mobile security.

NIST updates guidelines for mobile device security

Jul 11, 2012

The National Institute of Standards and Technology (NIST) has released a proposed update to its guidelines for securing mobile devices—such as smart phones and tablets—that are used by the federal government. NIST ...

Recommended for you

Voice, image give clues in hunt for Foley's killer

20 hours ago

Police and intelligence services are using image analysis and voice-recognition software, studying social media postings and seeking human tips as they scramble to identify the militant recorded on a video ...

Smartphone-loss anxiety disorder

20 hours ago

The smart phone has changed our behavior, sometimes for the better as we are now able to connect and engage with many more people than ever before, sometimes for the worse in that we may have become over-reliant on the connectivity ...

Why conspiracy theorists won't give up on MH17 and MH370

Aug 20, 2014

A huge criminal investigation is underway in the Netherlands, following the downing of flight MH17. Ten Dutch prosecutors and 200 policemen are involved in collecting evidence to present at the International Criminal Court in the Hague. The inv ...

Here's how you find out who shot down MH17

Aug 20, 2014

More than a month has passed since Malaysia Airlines flight MH17 crashed with the loss of all 298 lives on board. But despite the disturbances at the crash site near the small town of Grabovo, near Donetsk ...

Assange talks of leaving embassy, sowing confusion

Aug 18, 2014

WikiLeaks founder Julian Assange sowed confusion Monday with an announcement that appeared to indicate he was leaving his embassy bolt hole, but his spokesman later clarified that that would not happen unless ...

User comments : 0