Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 1 October, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Mobile security research uncovers gap between perception and reality of vulnerabilities

by The Gurus
December 7, 2018
in Editor's News, Mobile Security
Share on FacebookShare on Twitter

A new global research initiative conducted by BlackBerry Limited (NASDAQ: BBRY; TSX: BB), a global leader in secure mobile communications, finds that despite extensive resources dedicated to mobile security, many IT decision-makers remain concerned about the level of vulnerabilities that persist. The study surveyed 1,000 executives from seven countries across a wide range of vertical industries, including financial services, government and healthcare.
The survey reveals that 73 percent of organisations have a mobile security strategy in place, but only three percent say they have implemented the highest levels of security possible. This is in part because of user attitudes – 82 percent of the executives admit mobile security precautions cause at least some frustration among employees, and potentially hinder productivity. Overall, 44 percent fear that too much mobile security will prevent employees from doing their job.
This fear of implementing a stronger mobile environment led to a startling majority, 86 percent, of executives who said they are worried about the level of protection for their organisation with half saying they will experience more security breaches through mobile devices. Part of the reason organisations are opening themselves up to these risks is because of the growing trend of BYOD – where despite the popularity, almost half believe that supporting a BYOD policy is a risk. A critical element to a successful BYOD or COPE (corporate owned, personally enabled) mobile environment is ensuring the isolation and separation of personal and business mobile data, also known as containerisation. However, nearly 45 percent have no containerisation technology in place.
“The frequency and severity of malicious attacks have made mobile security the center of attention for CEOs and boards of directors, but doing enough to mitigate risk is still a persistent problem that needs to be solved. This is especially true as the constant adoption of new technologies regularly brings the potential for new vulnerabilities, which can offset the benefits,” said David Kleidermacher, Chief Security Officer at BlackBerry. “We have also heard many of our customers say that security policies can be perceived as a hindrance. However, senior executives in every function, and even in the boardroom, need to forcefully communicate that effective mobile security enhances productivity instead of obstructing it.”
The research also uncovered that nearly half of organisations do not have a Security Incident Response Team (SIRT) in place, despite the fact that SIRT is an industry best practice to reduce the cost of data breaches. IT decision-makers also want and seek outside help when it comes to securing their mobile environments. Of those surveyed, 59 percent report that external expertise is the best option for reviewing mobile practices.
The numbers are just as pronounced and even more so when analysing specific industries:

  • Only around four in ten respondents’ organisations have a mobile device management strategy in place. Of these respondents, many felt their organisation’s mobile device security strategy is not good enough, specifically:
    • Financial services: 44 percent
    • Government: 52 percent
    • Healthcare: 37 percent
    • Legal: 54 percent
  • Overall, 47 percent believe that popular BYOD policies leave the company vulnerable to too many risks, and those concerns are reflected in different sectors:
    • Financial services: 55 percent
    • Healthcare: 50 percent
    • Government: 43 percent
    • Legal: 53 percent
  • Seventy-three percent see mobile security controls as either an “obstruction” or a “complete obstruction,” and the problems are even worse in some industries:
    • Financial services: 78 percent
    • Healthcare: 78 percent
    • Government: 85 percent
    • Legal: 94 percent

However, there is general agreement that a strong mobile security posture can offer great benefits:

  • 67 percent say their data is more secure
  • 64 percent see increased mobility for employees
  • 51 percent have experienced fewer security breaches
  • 50 percent find it easier to comply with regulations
  • Enhanced compliance is a benefit for financial services (55 percent), healthcare (54 percent) and IT/computer services (65 percent)

“All mobile security policies must be consistently evaluated and tweaked, but also regularly overhauled,” added Kleidermacher. “BlackBerry recognises that security is a dynamic field, and even the best defensive strategies and technologies today may be inadequate tomorrow. Therefore, the optimal strategy is one that secures the mobile enterprise while boosting convenience and productivity, and can then be adapted to combat new vulnerabilities as they arise. BlackBerry continues to integrate key capabilities into its enterprise software portfolio to provide organisations the flexibility they need as they use mobility to empower IT decision makers and employees.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

Connected devices need e-commerce standard security say cyber security experts

Next Post

US Congress websites recovering after three-day DDoS attack

Recent News

Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023
software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information