73% use smartphone to access confidential information

Editor at InfoLeakage.com

More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. However, the conversation around the consumerization of IT almost always revolves around what IT departments think of this rapidly growing trend. So, Symantec recently conducted a short survey to learn more about end users’ experiences and perspectives. The survey’s full results can be found here, whereas a description of key-findings and best-practices are posted on Symantec’s Endpoint Security Blog.

From an awareness point of view a number of findings are noteworthy:

23 percent [...] think letting employees use the smartphone of their choice for work-related activities has no impact on the overall security of company networks and information, and another 52 percent think it only somewhat decreases the overall security.

[...] 51 percent said their employer has communicated policies and/or best practices to them regarding the security of their smartphones.

42 percent of respondents said they are not aware of any mobile device security and/or management software or tools their company uses in relation to their devices.

73 percent said they use their work-related smartphones to access information that could be considered sensitive or confidential.

73 percent of the potentially sensitive or confidential information accessed by respondents is competitive or proprietary data.

67 percent of the potentially sensitive or confidential information accessed by respondents is personally identifiable information.

In accordance with our survey and research, to be published next week, Symantec concludes that “employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done”.

Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter


You must login in order to reply.

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


News and analyses on Human Factors & Awareness

Upcoming events

No events