Thursday, February 09, 2012

Mobile security: Lack of awareness of the employee raises red flag

The report The Impact of Mobile Devices for Information Security, published by Check Point, reveals that 71% of companies believe that the adoption of mobile devices has boosted the number of security incidents, citing among his biggest concerns the loss of information and privacy sensitive, stored on devices for employees, including corporate e-mail (79%), customer data (47%) and login information network (38%).The survey also shows that smartphones and tablets are increasingly present in the corporate environment which causes a new area of ​​focus for IT managers. That's because they have to create security policies for thousands of devices and operating systems involved, and at the same time, protect the company against data loss and the increasing presence of mobile threats.The study found that Check Point:• Increased number of connections to corporate networks via mobile devices - Approximately 94% of companies surveyed reported an increase in the number of personal mobile devices connected to the corporate network, with 78% of respondents noting a 100% growth over the past two years.• Mobile devices and their most common security risks - Apple (30%) and Blackberry (29%) were the most common types of mobile devices connecting to corporate networks, followed by Android (21%). Almost half of respondents (43%) also believes that Android devices pose the greatest risk mobile security.• The employee's behavior affects the safety of mobile data - Most companies believe that the greatest impact on mobile data security is the lack of awareness of safety among employees - followed by the mobile navigation (61%), connectivity Wi-Fi security (59%), lost or stolen devices (58%) and download malicious mobile application (57%).• Many mobile devices storing sensitive customer data and company - personal and corporate devices typically store and access a wealth of information, including e-mails (79%), customer data (47%) and login credentials (38 %) from the internal databases or business applications.

No comments:

Post a Comment