Mobile devices grow as source of confidential data loss

Editor at

Recently, we reported on a study conducted by Unisys stressing coporates’ security challeges for 2011. One of the findings concentrated on the consumerization of IT trend and how it “presents a double-edged sword”.

Today, Symantec presented its security predictions for 2011. Their security challenge for 2011 also is to be found in “the exponential consumer adoption of smart mobile devices [that] will increasingly result in these devices making their way into enterprises through the back door, blurring the lines between business and personal use, and driving new IT security models to market in 2011″. Accoording to Symantec “it is inevitable that attackers will target mobile devices in 2011 and that mobile devices will continue to grow as a source of confidential data loss”.

Share article:
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

One comment on “Mobile devices grow as source of confidential data loss”

  1. Rachel McShelley zegt:

    What strikes me (again) is the lack of focus on awareness raising and human factors. It seems to me that IT budgets under pressure, should consider this crucial first step before (chronological) implementing expensive security software. Too often a wrong or missing perception of the value of the information is at the root of a leak, disclosed through a medium, e.g. a mobile device.


You must login in order to reply.

Panel's Jotter

Editor Intelink says:(2012-10-02 10:49:19)

“Een kwaliteitsslag voor school, student en stagebedrijf” Het herkennen en correct behandelen van bedrijfsvertrouwelijke informatie. Het programma speelt tevens doeltreffend in op de sterk toenemende behoefte aan Social Media Integriteit van stag...

On: Stagevoorbereiding voor MBO en HBO: Bewustwording Bedrijfsgeheimen & Social Media Integriteit
Danny Lieberman says:(2011-05-09 13:35:04)

As one of the pioneers in DLP - data loss prevention and an active thought leader in the field since 2003 - it is typical for people who discover that the emperor is naked to take knee jerk reactions. IT and HR procedures are part of a set of data...

On: WikiLeaks legt menselijke factor bloot (EN)
Rachel McShelley says:(2011-03-31 10:01:15)

Blijft helaas onduidelijk waarom BitDefender dit opvallend en vooral ook een beveiligingsrisico vindt.

On: Facebook: 42% onbekende online vrienden
View all replies»

Join us on:

  • Facebook
  • LinkedIn
  • RSS
  • Twitter


Join our Research Panel!
Sign up for: Study into Information Leakage in the Netherlands 2010


News and analyses on Human Factors & Awareness

Upcoming events

No events