SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Survey Results:
The Consumerization of IT
from the End User’s Perspective
Methodology
• Survey conducted via MarketTools, Inc.
• 154 respondents
• Respondents recruited through social media channels
• Only respondents using a smartphone in connection with
  employment counted




                                                           2
Key Findings
• End users don’t comprehend the security risks
• The consumerization of IT is already a reality for most
  organizations
• Most organizations not effectively communicating policies
  and/or best practices
• Policies and/or best practices primarily deal with the loss or
  theft of devices, with malware still taking a backseat




                                                                   3
Key Findings
• Employees are using smartphones to access sensitive and
  confidential information
• End users don’t fully realize the potentially sensitive nature of
  the information stored on smartphones
• Smartphones rank high on end users’ must-have technology
  lists
• Despite being tech savvy smartphone users, some people just
  shouldn’t be parents




                                                                      4
End users realize the productivity and satisfaction
benefits of allowing employees to use the smartphones
of their choice for work, but don’t fully comprehend
the extent of the security challenges this creates.
40%                                                          38%                60%
35%                                             33%                                                                                            48%
                                                                                50%
30%                                                                                                                              37%
25%                                                                             40%
20%                                18%                                          30%
15%                                                                             20%
10%       5%           6%                                                                                            7%
                                                                                10%                     6%
 5%                                                                                        1%
 0%                                                                               0%
      Significantly Somewhat No impact Somewhat Significantly                          Significantly Somewhat No impact Somewhat Significantly
       decreases decreases          on        increases    increases                    decreases decreases           on       increases    increases
      productivity productivity productivity productivity productivity                 satisfaction satisfaction satisfaction satisfaction satisfaction


                                         60%                    52%
                                         50%
                                         40%
                                         30%                                23%
                                         20%       16%

                                         10%                                              4%          5%
                                          0%
                                                Significantly Somewhat    No impact    Somewhat Significantly
                                                 decreases decreases      on overall    increases increases
                                                   overall      overall    security       overall   overall
                                                  security     security                  security  security

                                                                                                                                                          5
The consumerization of IT has already become a reality
for most organizations.
    Does your company allow employees to use the smartphones of their choice for work-related
                                          activities?


                                                                No
                                                               12%
      Yes, but only within a set list of
            smartphone options
                    25%
                                                                                        Yes
                                                                                        63%




                                 How did you obtain your work-related smartphone?



                                           I purchased it with my own My employer provided it to
                                                     funds                      me
                                                      43%                      44%




                                                                                       My employer provided me with a
                                                                                          stipend and I purchased it
                                                                                                    14%
                                                                                                                        6
Despite most organizations allowing employees to use
their work-related smartphones for personal use, they
are still struggling to effectively communicate mobile
device policies and/or best practices.
        Does your company allow employees to use their work-related smartphones for personal use?

                                                   No
                                                   9%




                                                        Yes
                                                        91%




Has your employer communicated any policies and/or best practices to you regarding the security of your work-
                                          related smartphone?



                                         No
                                        49%                         Yes
                                                                    51%




                                                                                                            7
The mobile device security policies and/or best
practices that are being communicated primarily deal
with the loss or theft of devices, with malicious apps
still taking a backseat.
               Which of the following security-related policies and/or best practices has your
              employer communicated to you regarding your work-related smartphone? (Please
                                            select all that apply)
                                                                           0%   10%   20%   30%   40%    50%   60%    70%   80%   90% 100%



        Guidelines for password protecting access to my smartphone                                                                 88%




                  Guidelines for downloading apps to my smartphone                                      42%




   Guidelines for using security software (i.e. antivirus, remote device
             lock, remote device wipe) on my smartphone
                                                                                                                     62%



     Guidelines for which smartphones are allowed to connect to
  company resources based on platform (i.e. BlackBerry, Android, iOS,                                                 65%
                             Windows)




                                                                                                                                             8
Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
    Do you use your work-related smartphone to access information that could be considered sensitive
                                          or confidential?

                                                No
                                               27%

                                                        Yes
                                                        73%




 Are you aware of any mobile device security and/or management software or tools your company uses in
                            connection with your work-related smartphone?


                                             No
                                            42%

                                                           Yes
                                                           58%




                                                                                                        9
Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
                  What types of information do you access on your phone that could be
                   considered sensitive or confidential? (Please select all that apply)
                                             0%   10%   20%         30%   40%     50%   60%   70%     80%



                            Financial data                                  40%




                       Employee records                       22%




       Personally identifiable information                                                    67%




     Competitive/proprietary information                                                            73%




                                                                                                            10
End users don’t fully realize the potentially sensitive
 nature of the information stored on smartphones.
         Please rank the following items based on the emotional distress each one would cause you if
          lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4
                          being the item that would cause the least emotional distress.
100%

                                  13%                        11%
90%     21%

80%                                                          20%
                                                                                       54%
70%                               35%
        27%
60%                                                          17%
                                                                                                         4
50%                                                                                                      3
                                                                                                         2
40%     24%
                                                                                       18%               1
                                  39%
30%
                                                             52%
20%
                                                                                       20%
        27%
10%
                                  13%
                                                                                       8%
 0%
       Laptop                  Smartphone                   Wallet                   Car keys



                                                                                                         11
Smartphones rank high on end users’ must-have
technology lists.

                       Which of the following would you give up before giving up of your
                                  smartphone? (Please select all that apply)
                       0%      10%     20%     30%     40%         50%    60%   70%        80%         90%



         MP3 Player                                                                              82%




                 TV                                   35%




                DVR                                                 49%




             Laptop                          24%




     Tablet computer                                         43%




                                                                                                             12
Despite being tech savvy smartphone users, some
people just shouldn’t be parents.


                    Which of the following would you give up before giving
                    up of your smartphone? (Please select all that apply)
                                    0%        5%   10%   15%   20%   25%   30%    35%




                  Firstborn child        1%




         Favorite food for a year                                           29%




                                                                                        13
Symantec
Recommendations




                  14
Recommendations
• Encrypt the data on mobile devices
• Use security software on your smartphone
• Develop and enforce strong security policies for using mobile devices
• Make sure all software is up-to-date
• Avoid opening unexpected text messages from unknown senders
• Click with caution when engaging in mobile social networking
• Users should be aware of their surroundings when accessing sensitive
  information
• Focus on protecting information as opposed to focusing on the
  devices
• Know what to do if a device is lost or stolen
• Mobile management is key

                                                                          15
Thank you!
For more information, please visit http://bit.ly/jHvrgN.




Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        16

Contenu connexe

Tendances

Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
 
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeople2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeopleViral Thaker
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobviteglennmanko
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
Delvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N GenDelvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N GenSteve Mast
 
CCBA Pilot Results 2010
CCBA Pilot Results 2010CCBA Pilot Results 2010
CCBA Pilot Results 2010Equinox IT
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationswissnex San Francisco
 
Asia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media trainAsia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media trainBurson-Marsteller Asia-Pacific
 
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...MeasureWorks
 
Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09Michael Johnston
 
Social media in Ireland Overview
Social media in Ireland OverviewSocial media in Ireland Overview
Social media in Ireland OverviewOisin Byrne
 
Insurance Sector ORBIT Report
Insurance Sector ORBIT ReportInsurance Sector ORBIT Report
Insurance Sector ORBIT ReportORmarketing
 
China Online Retail Market - iResearch - Will Tao
China Online Retail Market -  iResearch - Will TaoChina Online Retail Market -  iResearch - Will Tao
China Online Retail Market - iResearch - Will TaoiResearch
 
Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012Brian Crotty
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
 

Tendances (16)

Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeople2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
Delvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N GenDelvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N Gen
 
CCBA Pilot Results 2010
CCBA Pilot Results 2010CCBA Pilot Results 2010
CCBA Pilot Results 2010
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentation
 
Asia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media trainAsia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media train
 
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
 
Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09
 
Social media in Ireland Overview
Social media in Ireland OverviewSocial media in Ireland Overview
Social media in Ireland Overview
 
Insurance Sector ORBIT Report
Insurance Sector ORBIT ReportInsurance Sector ORBIT Report
Insurance Sector ORBIT Report
 
Raddon Chart of the Day June 19, 2012
Raddon Chart of the Day June 19, 2012Raddon Chart of the Day June 19, 2012
Raddon Chart of the Day June 19, 2012
 
China Online Retail Market - iResearch - Will Tao
China Online Retail Market -  iResearch - Will TaoChina Online Retail Market -  iResearch - Will Tao
China Online Retail Market - iResearch - Will Tao
 
Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
 

En vedette

INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...Symantec
 
Accidental entrepreneur
Accidental entrepreneurAccidental entrepreneur
Accidental entrepreneurSymantec
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...Symantec
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...Symantec
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence ReportSymantec
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec
 

En vedette (8)

INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
 
Accidental entrepreneur
Accidental entrepreneurAccidental entrepreneur
Accidental entrepreneur
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check
 

Similaire à Survey Results: The consumerization of it from the end user’s perspective

Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM surveyThe Reference
 
Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01apymuamua
 
Online Reputation in a Connected World
Online Reputation in a Connected WorldOnline Reputation in a Connected World
Online Reputation in a Connected WorldNick Braak
 
Data Privacy Day Online Reputation Research
Data Privacy Day Online Reputation ResearchData Privacy Day Online Reputation Research
Data Privacy Day Online Reputation ResearchElizabeth Lupfer
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Symantec
 
Aflac Social Media ROI
Aflac Social Media ROIAflac Social Media ROI
Aflac Social Media ROIJames Wisdom
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment B2B Marketing
 
Connecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John FettoConnecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John FettoSFIMA
 
Collaborating for innovation 2010
Collaborating for innovation 2010Collaborating for innovation 2010
Collaborating for innovation 2010Koen Klokgieters
 
2012 mobile forecast doe higher education
2012 mobile forecast doe higher education2012 mobile forecast doe higher education
2012 mobile forecast doe higher educationIvonne Kinser
 
Career development survey results april 2012
Career development survey results april 2012Career development survey results april 2012
Career development survey results april 2012Doug Shaw
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech WeekThe Judge Group
 
Integration present
Integration presentIntegration present
Integration presentting0631
 
Ad Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAd Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAnna
 
Mis tue 1000 david gill
Mis tue 1000 david gillMis tue 1000 david gill
Mis tue 1000 david gillMediaPost
 
Salesforce Admins Exposed
Salesforce Admins ExposedSalesforce Admins Exposed
Salesforce Admins ExposedCloudingo
 
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...iStrategy
 

Similaire à Survey Results: The consumerization of it from the end user’s perspective (20)

What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
Mobile ecosystem
Mobile ecosystemMobile ecosystem
Mobile ecosystem
 
Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM survey
 
Mobile Recruiting Observations 2012 | MREC
Mobile Recruiting Observations 2012 | MRECMobile Recruiting Observations 2012 | MREC
Mobile Recruiting Observations 2012 | MREC
 
Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01
 
Online Reputation in a Connected World
Online Reputation in a Connected WorldOnline Reputation in a Connected World
Online Reputation in a Connected World
 
Data Privacy Day Online Reputation Research
Data Privacy Day Online Reputation ResearchData Privacy Day Online Reputation Research
Data Privacy Day Online Reputation Research
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010
 
Aflac Social Media ROI
Aflac Social Media ROIAflac Social Media ROI
Aflac Social Media ROI
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment
 
Connecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John FettoConnecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John Fetto
 
Collaborating for innovation 2010
Collaborating for innovation 2010Collaborating for innovation 2010
Collaborating for innovation 2010
 
2012 mobile forecast doe higher education
2012 mobile forecast doe higher education2012 mobile forecast doe higher education
2012 mobile forecast doe higher education
 
Career development survey results april 2012
Career development survey results april 2012Career development survey results april 2012
Career development survey results april 2012
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
Integration present
Integration presentIntegration present
Integration present
 
Ad Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAd Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher Survey
 
Mis tue 1000 david gill
Mis tue 1000 david gillMis tue 1000 david gill
Mis tue 1000 david gill
 
Salesforce Admins Exposed
Salesforce Admins ExposedSalesforce Admins Exposed
Salesforce Admins Exposed
 
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
 

Plus de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Survey Results: The consumerization of it from the end user’s perspective

  • 1. Survey Results: The Consumerization of IT from the End User’s Perspective
  • 2. Methodology • Survey conducted via MarketTools, Inc. • 154 respondents • Respondents recruited through social media channels • Only respondents using a smartphone in connection with employment counted 2
  • 3. Key Findings • End users don’t comprehend the security risks • The consumerization of IT is already a reality for most organizations • Most organizations not effectively communicating policies and/or best practices • Policies and/or best practices primarily deal with the loss or theft of devices, with malware still taking a backseat 3
  • 4. Key Findings • Employees are using smartphones to access sensitive and confidential information • End users don’t fully realize the potentially sensitive nature of the information stored on smartphones • Smartphones rank high on end users’ must-have technology lists • Despite being tech savvy smartphone users, some people just shouldn’t be parents 4
  • 5. End users realize the productivity and satisfaction benefits of allowing employees to use the smartphones of their choice for work, but don’t fully comprehend the extent of the security challenges this creates. 40% 38% 60% 35% 33% 48% 50% 30% 37% 25% 40% 20% 18% 30% 15% 20% 10% 5% 6% 7% 10% 6% 5% 1% 0% 0% Significantly Somewhat No impact Somewhat Significantly Significantly Somewhat No impact Somewhat Significantly decreases decreases on increases increases decreases decreases on increases increases productivity productivity productivity productivity productivity satisfaction satisfaction satisfaction satisfaction satisfaction 60% 52% 50% 40% 30% 23% 20% 16% 10% 4% 5% 0% Significantly Somewhat No impact Somewhat Significantly decreases decreases on overall increases increases overall overall security overall overall security security security security 5
  • 6. The consumerization of IT has already become a reality for most organizations. Does your company allow employees to use the smartphones of their choice for work-related activities? No 12% Yes, but only within a set list of smartphone options 25% Yes 63% How did you obtain your work-related smartphone? I purchased it with my own My employer provided it to funds me 43% 44% My employer provided me with a stipend and I purchased it 14% 6
  • 7. Despite most organizations allowing employees to use their work-related smartphones for personal use, they are still struggling to effectively communicate mobile device policies and/or best practices. Does your company allow employees to use their work-related smartphones for personal use? No 9% Yes 91% Has your employer communicated any policies and/or best practices to you regarding the security of your work- related smartphone? No 49% Yes 51% 7
  • 8. The mobile device security policies and/or best practices that are being communicated primarily deal with the loss or theft of devices, with malicious apps still taking a backseat. Which of the following security-related policies and/or best practices has your employer communicated to you regarding your work-related smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Guidelines for password protecting access to my smartphone 88% Guidelines for downloading apps to my smartphone 42% Guidelines for using security software (i.e. antivirus, remote device lock, remote device wipe) on my smartphone 62% Guidelines for which smartphones are allowed to connect to company resources based on platform (i.e. BlackBerry, Android, iOS, 65% Windows) 8
  • 9. Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done. Do you use your work-related smartphone to access information that could be considered sensitive or confidential? No 27% Yes 73% Are you aware of any mobile device security and/or management software or tools your company uses in connection with your work-related smartphone? No 42% Yes 58% 9
  • 10. Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done. What types of information do you access on your phone that could be considered sensitive or confidential? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% Financial data 40% Employee records 22% Personally identifiable information 67% Competitive/proprietary information 73% 10
  • 11. End users don’t fully realize the potentially sensitive nature of the information stored on smartphones. Please rank the following items based on the emotional distress each one would cause you if lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4 being the item that would cause the least emotional distress. 100% 13% 11% 90% 21% 80% 20% 54% 70% 35% 27% 60% 17% 4 50% 3 2 40% 24% 18% 1 39% 30% 52% 20% 20% 27% 10% 13% 8% 0% Laptop Smartphone Wallet Car keys 11
  • 12. Smartphones rank high on end users’ must-have technology lists. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% MP3 Player 82% TV 35% DVR 49% Laptop 24% Tablet computer 43% 12
  • 13. Despite being tech savvy smartphone users, some people just shouldn’t be parents. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 5% 10% 15% 20% 25% 30% 35% Firstborn child 1% Favorite food for a year 29% 13
  • 15. Recommendations • Encrypt the data on mobile devices • Use security software on your smartphone • Develop and enforce strong security policies for using mobile devices • Make sure all software is up-to-date • Avoid opening unexpected text messages from unknown senders • Click with caution when engaging in mobile social networking • Users should be aware of their surroundings when accessing sensitive information • Focus on protecting information as opposed to focusing on the devices • Know what to do if a device is lost or stolen • Mobile management is key 15
  • 16. Thank you! For more information, please visit http://bit.ly/jHvrgN. Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 16