SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Survey Results:
The Consumerization of IT
from the End User’s Perspective
Methodology
• Survey conducted via MarketTools, Inc.
• 154 respondents
• Respondents recruited through social media channels
• Only respondents using a smartphone in connection with
  employment counted




                                                           2
Key Findings
• End users don’t comprehend the security risks
• The consumerization of IT is already a reality for most
  organizations
• Most organizations not effectively communicating policies
  and/or best practices
• Policies and/or best practices primarily deal with the loss or
  theft of devices, with malware still taking a backseat




                                                                   3
Key Findings
• Employees are using smartphones to access sensitive and
  confidential information
• End users don’t fully realize the potentially sensitive nature of
  the information stored on smartphones
• Smartphones rank high on end users’ must-have technology
  lists
• Despite being tech savvy smartphone users, some people just
  shouldn’t be parents




                                                                      4
End users realize the productivity and satisfaction
benefits of allowing employees to use the smartphones
of their choice for work, but don’t fully comprehend
the extent of the security challenges this creates.
40%                                                          38%                60%
35%                                             33%                                                                                            48%
                                                                                50%
30%                                                                                                                              37%
25%                                                                             40%
20%                                18%                                          30%
15%                                                                             20%
10%       5%           6%                                                                                            7%
                                                                                10%                     6%
 5%                                                                                        1%
 0%                                                                               0%
      Significantly Somewhat No impact Somewhat Significantly                          Significantly Somewhat No impact Somewhat Significantly
       decreases decreases          on        increases    increases                    decreases decreases           on       increases    increases
      productivity productivity productivity productivity productivity                 satisfaction satisfaction satisfaction satisfaction satisfaction


                                         60%                    52%
                                         50%
                                         40%
                                         30%                                23%
                                         20%       16%

                                         10%                                              4%          5%
                                          0%
                                                Significantly Somewhat    No impact    Somewhat Significantly
                                                 decreases decreases      on overall    increases increases
                                                   overall      overall    security       overall   overall
                                                  security     security                  security  security

                                                                                                                                                          5
The consumerization of IT has already become a reality
for most organizations.
    Does your company allow employees to use the smartphones of their choice for work-related
                                          activities?


                                                                No
                                                               12%
      Yes, but only within a set list of
            smartphone options
                    25%
                                                                                        Yes
                                                                                        63%




                                 How did you obtain your work-related smartphone?



                                           I purchased it with my own My employer provided it to
                                                     funds                      me
                                                      43%                      44%




                                                                                       My employer provided me with a
                                                                                          stipend and I purchased it
                                                                                                    14%
                                                                                                                        6
Despite most organizations allowing employees to use
their work-related smartphones for personal use, they
are still struggling to effectively communicate mobile
device policies and/or best practices.
        Does your company allow employees to use their work-related smartphones for personal use?

                                                   No
                                                   9%




                                                        Yes
                                                        91%




Has your employer communicated any policies and/or best practices to you regarding the security of your work-
                                          related smartphone?



                                         No
                                        49%                         Yes
                                                                    51%




                                                                                                            7
The mobile device security policies and/or best
practices that are being communicated primarily deal
with the loss or theft of devices, with malicious apps
still taking a backseat.
               Which of the following security-related policies and/or best practices has your
              employer communicated to you regarding your work-related smartphone? (Please
                                            select all that apply)
                                                                           0%   10%   20%   30%   40%    50%   60%    70%   80%   90% 100%



        Guidelines for password protecting access to my smartphone                                                                 88%




                  Guidelines for downloading apps to my smartphone                                      42%




   Guidelines for using security software (i.e. antivirus, remote device
             lock, remote device wipe) on my smartphone
                                                                                                                     62%



     Guidelines for which smartphones are allowed to connect to
  company resources based on platform (i.e. BlackBerry, Android, iOS,                                                 65%
                             Windows)




                                                                                                                                             8
Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
    Do you use your work-related smartphone to access information that could be considered sensitive
                                          or confidential?

                                                No
                                               27%

                                                        Yes
                                                        73%




 Are you aware of any mobile device security and/or management software or tools your company uses in
                            connection with your work-related smartphone?


                                             No
                                            42%

                                                           Yes
                                                           58%




                                                                                                        9
Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
                  What types of information do you access on your phone that could be
                   considered sensitive or confidential? (Please select all that apply)
                                             0%   10%   20%         30%   40%     50%   60%   70%     80%



                            Financial data                                  40%




                       Employee records                       22%




       Personally identifiable information                                                    67%




     Competitive/proprietary information                                                            73%




                                                                                                            10
End users don’t fully realize the potentially sensitive
 nature of the information stored on smartphones.
         Please rank the following items based on the emotional distress each one would cause you if
          lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4
                          being the item that would cause the least emotional distress.
100%

                                  13%                        11%
90%     21%

80%                                                          20%
                                                                                       54%
70%                               35%
        27%
60%                                                          17%
                                                                                                         4
50%                                                                                                      3
                                                                                                         2
40%     24%
                                                                                       18%               1
                                  39%
30%
                                                             52%
20%
                                                                                       20%
        27%
10%
                                  13%
                                                                                       8%
 0%
       Laptop                  Smartphone                   Wallet                   Car keys



                                                                                                         11
Smartphones rank high on end users’ must-have
technology lists.

                       Which of the following would you give up before giving up of your
                                  smartphone? (Please select all that apply)
                       0%      10%     20%     30%     40%         50%    60%   70%        80%         90%



         MP3 Player                                                                              82%




                 TV                                   35%




                DVR                                                 49%




             Laptop                          24%




     Tablet computer                                         43%




                                                                                                             12
Despite being tech savvy smartphone users, some
people just shouldn’t be parents.


                    Which of the following would you give up before giving
                    up of your smartphone? (Please select all that apply)
                                    0%        5%   10%   15%   20%   25%   30%    35%




                  Firstborn child        1%




         Favorite food for a year                                           29%




                                                                                        13
Symantec
Recommendations




                  14
Recommendations
• Encrypt the data on mobile devices
• Use security software on your smartphone
• Develop and enforce strong security policies for using mobile devices
• Make sure all software is up-to-date
• Avoid opening unexpected text messages from unknown senders
• Click with caution when engaging in mobile social networking
• Users should be aware of their surroundings when accessing sensitive
  information
• Focus on protecting information as opposed to focusing on the
  devices
• Know what to do if a device is lost or stolen
• Mobile management is key

                                                                          15
Thank you!
For more information, please visit http://bit.ly/jHvrgN.




Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        16

Más contenido relacionado

La actualidad más candente

Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportLumension
 
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeople2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeopleViral Thaker
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobviteglennmanko
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
Delvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N GenDelvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N GenSteve Mast
 
CCBA Pilot Results 2010
CCBA Pilot Results 2010CCBA Pilot Results 2010
CCBA Pilot Results 2010Equinox IT
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationswissnex San Francisco
 
Asia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media trainAsia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media trainBurson-Marsteller Asia-Pacific
 
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...MeasureWorks
 
Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09Michael Johnston
 
Social media in Ireland Overview
Social media in Ireland OverviewSocial media in Ireland Overview
Social media in Ireland OverviewOisin Byrne
 
Insurance Sector ORBIT Report
Insurance Sector ORBIT ReportInsurance Sector ORBIT Report
Insurance Sector ORBIT ReportORmarketing
 
China Online Retail Market - iResearch - Will Tao
China Online Retail Market -  iResearch - Will TaoChina Online Retail Market -  iResearch - Will Tao
China Online Retail Market - iResearch - Will TaoiResearch
 
Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012Brian Crotty
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
 

La actualidad más candente (16)

Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeople2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
Delvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N GenDelvinia Insights Boomers Vs N Gen
Delvinia Insights Boomers Vs N Gen
 
CCBA Pilot Results 2010
CCBA Pilot Results 2010CCBA Pilot Results 2010
CCBA Pilot Results 2010
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentation
 
Asia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media trainAsia Online? How Asian companies are missing the social media train
Asia Online? How Asian companies are missing the social media train
 
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
 
Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09Accenture Consumer Electronics Products And Services Usage 09
Accenture Consumer Electronics Products And Services Usage 09
 
Social media in Ireland Overview
Social media in Ireland OverviewSocial media in Ireland Overview
Social media in Ireland Overview
 
Insurance Sector ORBIT Report
Insurance Sector ORBIT ReportInsurance Sector ORBIT Report
Insurance Sector ORBIT Report
 
Raddon Chart of the Day June 19, 2012
Raddon Chart of the Day June 19, 2012Raddon Chart of the Day June 19, 2012
Raddon Chart of the Day June 19, 2012
 
China Online Retail Market - iResearch - Will Tao
China Online Retail Market -  iResearch - Will TaoChina Online Retail Market -  iResearch - Will Tao
China Online Retail Market - iResearch - Will Tao
 
Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012Adobe: State of online advertising study Oct 24 2012
Adobe: State of online advertising study Oct 24 2012
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
 

Destacado

INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...Symantec
 
Accidental entrepreneur
Accidental entrepreneurAccidental entrepreneur
Accidental entrepreneurSymantec
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...Symantec
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...Symantec
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence ReportSymantec
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec
 

Destacado (8)

INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
 
Accidental entrepreneur
Accidental entrepreneurAccidental entrepreneur
Accidental entrepreneur
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...2012 State of Information Digital Information Index Information Sprawl Chapte...
2012 State of Information Digital Information Index Information Sprawl Chapte...
 
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
 
2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report2012 July Symantec Intelligence Report
2012 July Symantec Intelligence Report
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Symantec 2010 Information Management Health Check
Symantec 2010 Information Management Health CheckSymantec 2010 Information Management Health Check
Symantec 2010 Information Management Health Check
 

Similar a Survey Results: The consumerization of it from the end user’s perspective

Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM surveyThe Reference
 
Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01apymuamua
 
Online Reputation in a Connected World
Online Reputation in a Connected WorldOnline Reputation in a Connected World
Online Reputation in a Connected WorldNick Braak
 
Data Privacy Day Online Reputation Research
Data Privacy Day Online Reputation ResearchData Privacy Day Online Reputation Research
Data Privacy Day Online Reputation ResearchElizabeth Lupfer
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Symantec
 
Aflac Social Media ROI
Aflac Social Media ROIAflac Social Media ROI
Aflac Social Media ROIJames Wisdom
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment B2B Marketing
 
Connecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John FettoConnecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John FettoSFIMA
 
Collaborating for innovation 2010
Collaborating for innovation 2010Collaborating for innovation 2010
Collaborating for innovation 2010Koen Klokgieters
 
2012 mobile forecast doe higher education
2012 mobile forecast doe higher education2012 mobile forecast doe higher education
2012 mobile forecast doe higher educationIvonne Kinser
 
Career development survey results april 2012
Career development survey results april 2012Career development survey results april 2012
Career development survey results april 2012Doug Shaw
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech WeekThe Judge Group
 
Integration present
Integration presentIntegration present
Integration presentting0631
 
Ad Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAd Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAnna
 
Mis tue 1000 david gill
Mis tue 1000 david gillMis tue 1000 david gill
Mis tue 1000 david gillMediaPost
 
Salesforce Admins Exposed
Salesforce Admins ExposedSalesforce Admins Exposed
Salesforce Admins ExposedCloudingo
 
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...iStrategy
 

Similar a Survey Results: The consumerization of it from the end user’s perspective (20)

What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
Mobile ecosystem
Mobile ecosystemMobile ecosystem
Mobile ecosystem
 
Reference data2012 e-CRM survey
Reference data2012 e-CRM surveyReference data2012 e-CRM survey
Reference data2012 e-CRM survey
 
Mobile Recruiting Observations 2012 | MREC
Mobile Recruiting Observations 2012 | MRECMobile Recruiting Observations 2012 | MREC
Mobile Recruiting Observations 2012 | MREC
 
Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01Marketreport 100809100201-phpapp01
Marketreport 100809100201-phpapp01
 
Online Reputation in a Connected World
Online Reputation in a Connected WorldOnline Reputation in a Connected World
Online Reputation in a Connected World
 
Data Privacy Day Online Reputation Research
Data Privacy Day Online Reputation ResearchData Privacy Day Online Reputation Research
Data Privacy Day Online Reputation Research
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010
 
Aflac Social Media ROI
Aflac Social Media ROIAflac Social Media ROI
Aflac Social Media ROI
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment
 
Connecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John FettoConnecting and Engaging Customers Through Social Media - John Fetto
Connecting and Engaging Customers Through Social Media - John Fetto
 
Collaborating for innovation 2010
Collaborating for innovation 2010Collaborating for innovation 2010
Collaborating for innovation 2010
 
2012 mobile forecast doe higher education
2012 mobile forecast doe higher education2012 mobile forecast doe higher education
2012 mobile forecast doe higher education
 
Career development survey results april 2012
Career development survey results april 2012Career development survey results april 2012
Career development survey results april 2012
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
Integration present
Integration presentIntegration present
Integration present
 
Ad Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher SurveyAd Mob Mobile Metrics Mar 10 Publisher Survey
Ad Mob Mobile Metrics Mar 10 Publisher Survey
 
Mis tue 1000 david gill
Mis tue 1000 david gillMis tue 1000 david gill
Mis tue 1000 david gill
 
Salesforce Admins Exposed
Salesforce Admins ExposedSalesforce Admins Exposed
Salesforce Admins Exposed
 
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
iStrategy Melbourne - Customer Relevance: The Next Frontier for Competitive A...
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Survey Results: The consumerization of it from the end user’s perspective

  • 1. Survey Results: The Consumerization of IT from the End User’s Perspective
  • 2. Methodology • Survey conducted via MarketTools, Inc. • 154 respondents • Respondents recruited through social media channels • Only respondents using a smartphone in connection with employment counted 2
  • 3. Key Findings • End users don’t comprehend the security risks • The consumerization of IT is already a reality for most organizations • Most organizations not effectively communicating policies and/or best practices • Policies and/or best practices primarily deal with the loss or theft of devices, with malware still taking a backseat 3
  • 4. Key Findings • Employees are using smartphones to access sensitive and confidential information • End users don’t fully realize the potentially sensitive nature of the information stored on smartphones • Smartphones rank high on end users’ must-have technology lists • Despite being tech savvy smartphone users, some people just shouldn’t be parents 4
  • 5. End users realize the productivity and satisfaction benefits of allowing employees to use the smartphones of their choice for work, but don’t fully comprehend the extent of the security challenges this creates. 40% 38% 60% 35% 33% 48% 50% 30% 37% 25% 40% 20% 18% 30% 15% 20% 10% 5% 6% 7% 10% 6% 5% 1% 0% 0% Significantly Somewhat No impact Somewhat Significantly Significantly Somewhat No impact Somewhat Significantly decreases decreases on increases increases decreases decreases on increases increases productivity productivity productivity productivity productivity satisfaction satisfaction satisfaction satisfaction satisfaction 60% 52% 50% 40% 30% 23% 20% 16% 10% 4% 5% 0% Significantly Somewhat No impact Somewhat Significantly decreases decreases on overall increases increases overall overall security overall overall security security security security 5
  • 6. The consumerization of IT has already become a reality for most organizations. Does your company allow employees to use the smartphones of their choice for work-related activities? No 12% Yes, but only within a set list of smartphone options 25% Yes 63% How did you obtain your work-related smartphone? I purchased it with my own My employer provided it to funds me 43% 44% My employer provided me with a stipend and I purchased it 14% 6
  • 7. Despite most organizations allowing employees to use their work-related smartphones for personal use, they are still struggling to effectively communicate mobile device policies and/or best practices. Does your company allow employees to use their work-related smartphones for personal use? No 9% Yes 91% Has your employer communicated any policies and/or best practices to you regarding the security of your work- related smartphone? No 49% Yes 51% 7
  • 8. The mobile device security policies and/or best practices that are being communicated primarily deal with the loss or theft of devices, with malicious apps still taking a backseat. Which of the following security-related policies and/or best practices has your employer communicated to you regarding your work-related smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Guidelines for password protecting access to my smartphone 88% Guidelines for downloading apps to my smartphone 42% Guidelines for using security software (i.e. antivirus, remote device lock, remote device wipe) on my smartphone 62% Guidelines for which smartphones are allowed to connect to company resources based on platform (i.e. BlackBerry, Android, iOS, 65% Windows) 8
  • 9. Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done. Do you use your work-related smartphone to access information that could be considered sensitive or confidential? No 27% Yes 73% Are you aware of any mobile device security and/or management software or tools your company uses in connection with your work-related smartphone? No 42% Yes 58% 9
  • 10. Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done. What types of information do you access on your phone that could be considered sensitive or confidential? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% Financial data 40% Employee records 22% Personally identifiable information 67% Competitive/proprietary information 73% 10
  • 11. End users don’t fully realize the potentially sensitive nature of the information stored on smartphones. Please rank the following items based on the emotional distress each one would cause you if lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4 being the item that would cause the least emotional distress. 100% 13% 11% 90% 21% 80% 20% 54% 70% 35% 27% 60% 17% 4 50% 3 2 40% 24% 18% 1 39% 30% 52% 20% 20% 27% 10% 13% 8% 0% Laptop Smartphone Wallet Car keys 11
  • 12. Smartphones rank high on end users’ must-have technology lists. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% MP3 Player 82% TV 35% DVR 49% Laptop 24% Tablet computer 43% 12
  • 13. Despite being tech savvy smartphone users, some people just shouldn’t be parents. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 5% 10% 15% 20% 25% 30% 35% Firstborn child 1% Favorite food for a year 29% 13
  • 15. Recommendations • Encrypt the data on mobile devices • Use security software on your smartphone • Develop and enforce strong security policies for using mobile devices • Make sure all software is up-to-date • Avoid opening unexpected text messages from unknown senders • Click with caution when engaging in mobile social networking • Users should be aware of their surroundings when accessing sensitive information • Focus on protecting information as opposed to focusing on the devices • Know what to do if a device is lost or stolen • Mobile management is key 15
  • 16. Thank you! For more information, please visit http://bit.ly/jHvrgN. Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 16