Survey finds disconnect between mobile device use and mobile security preparedness

Nov 08, 2012

While the majority of small business owners allow employees to use mobile devices such as smartphones and tablets, few have taken steps to ensure these devices are kept safe from cyber threats.

According to a recent survey commissioned by AT&T and the Polytechnic Institute of New York University, 90 percent of allow their employees to access work email via , and 41 percent allow employees to use these devices to access business files. Eighty three percent of small businesses allow employees to use personal devices for work.

Only 65 percent reported information and data of wireless devices as a concern, versus 91 percent concerned about computer and online data security. Fewer than one-third (29 percent) have installed anti-virus software on smartphones.

This video is not supported by your browser at this time.

The survey also found that 82 percent of small businesses have taken steps to secure company laptops. In contrast, only 32 percent are taking measures to protect smartphones, and 39 percent to protect tablets.  Of the majority not taking steps to protect these mobile devices, fewer than half (42 percent) have plans to increase security.

"There is a troubling disconnect between who want to keep data safe and the necessary steps to protect it," said Ed Amoroso, Chief Security Officer, AT&T. "With more employees using mobile devices, especially personal devices, business data is increasingly vulnerable to . Protecting critical information can be easy and affordable, and small businesses need to recognize the reality of today's environment – this is a step they can't afford to ignore."

In addition to mobile security questions, the survey also asked business owners whether their business had experienced a cyber or online security incident. Nearly four in 10 (37 percent) reported being the victim of a security breach, such as a virus, mobile malware or phishing, with 21 percent being victimized within the last two years. 

"Small businesses need to better understand their risk profile," said Nair Memon, Professor of Computer Science and Engineering and founding director of The Center for Interdisciplinary Studies in Security and Privacy (CRISSP) at NYU-Poly. "This means treating every device that touches your network, from laptops to smartphones, as vulnerabilities and ensuring that security is built into the equation at every level." 

For additional survey results, please click on this link for the fact sheet.

Explore further: Laptop used for first US presidential email finds a buyer

add to favorites email to friend print save as pdf

Related Stories

Mobile-security services take off

Sep 26, 2011

The prospect of consumers and employees physically losing information-packed mobile devices, or getting them hacked, has become the driver for a red-hot sector of the tech industry: supplying mobile security.

NIST updates guidelines for mobile device security

Jul 11, 2012

The National Institute of Standards and Technology (NIST) has released a proposed update to its guidelines for securing mobile devices—such as smart phones and tablets—that are used by the federal government. NIST ...

Recommended for you

Under some LED bulbs whites aren't 'whiter than white'

1 hour ago

For years, companies have been adding whiteners to laundry detergent, paints, plastics, paper and fabrics to make whites look "whiter than white," but now, with a switch away from incandescent and fluorescent lighting, different ...

Freight train industry to miss safety deadline

Apr 16, 2014

The U.S. freight railroad industry says only one-fifth of its track will be equipped with mandatory safety technology to prevent most collisions and derailments by the deadline set by Congress.

User comments : 0

More news stories

Under some LED bulbs whites aren't 'whiter than white'

For years, companies have been adding whiteners to laundry detergent, paints, plastics, paper and fabrics to make whites look "whiter than white," but now, with a switch away from incandescent and fluorescent lighting, different ...

Researchers uncover likely creator of Bitcoin

The primary author of the celebrated Bitcoin paper, and therefore probable creator of Bitcoin, is most likely Nick Szabo, a blogger and former George Washington University law professor, according to students ...

Continents may be a key feature of Super-Earths

Huge Earth-like planets that have both continents and oceans may be better at harboring extraterrestrial life than those that are water-only worlds. A new study gives hope for the possibility that many super-Earth ...

Researchers successfully clone adult human stem cells

(Phys.org) —An international team of researchers, led by Robert Lanza, of Advanced Cell Technology, has announced that they have performed the first successful cloning of adult human skin cells into stem ...