More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.
2. Methodology
• Survey conducted via MarketTools, Inc.
• 154 respondents
• Respondents recruited through social media channels
• Only respondents using a smartphone in connection with
employment counted
2
3. Key Findings
• End users don’t comprehend the security risks
• The consumerization of IT is already a reality for most
organizations
• Most organizations not effectively communicating policies
and/or best practices
• Policies and/or best practices primarily deal with the loss or
theft of devices, with malware still taking a backseat
3
4. Key Findings
• Employees are using smartphones to access sensitive and
confidential information
• End users don’t fully realize the potentially sensitive nature of
the information stored on smartphones
• Smartphones rank high on end users’ must-have technology
lists
• Despite being tech savvy smartphone users, some people just
shouldn’t be parents
4
5. End users realize the productivity and satisfaction
benefits of allowing employees to use the smartphones
of their choice for work, but don’t fully comprehend
the extent of the security challenges this creates.
40% 38% 60%
35% 33% 48%
50%
30% 37%
25% 40%
20% 18% 30%
15% 20%
10% 5% 6% 7%
10% 6%
5% 1%
0% 0%
Significantly Somewhat No impact Somewhat Significantly Significantly Somewhat No impact Somewhat Significantly
decreases decreases on increases increases decreases decreases on increases increases
productivity productivity productivity productivity productivity satisfaction satisfaction satisfaction satisfaction satisfaction
60% 52%
50%
40%
30% 23%
20% 16%
10% 4% 5%
0%
Significantly Somewhat No impact Somewhat Significantly
decreases decreases on overall increases increases
overall overall security overall overall
security security security security
5
6. The consumerization of IT has already become a reality
for most organizations.
Does your company allow employees to use the smartphones of their choice for work-related
activities?
No
12%
Yes, but only within a set list of
smartphone options
25%
Yes
63%
How did you obtain your work-related smartphone?
I purchased it with my own My employer provided it to
funds me
43% 44%
My employer provided me with a
stipend and I purchased it
14%
6
7. Despite most organizations allowing employees to use
their work-related smartphones for personal use, they
are still struggling to effectively communicate mobile
device policies and/or best practices.
Does your company allow employees to use their work-related smartphones for personal use?
No
9%
Yes
91%
Has your employer communicated any policies and/or best practices to you regarding the security of your work-
related smartphone?
No
49% Yes
51%
7
8. The mobile device security policies and/or best
practices that are being communicated primarily deal
with the loss or theft of devices, with malicious apps
still taking a backseat.
Which of the following security-related policies and/or best practices has your
employer communicated to you regarding your work-related smartphone? (Please
select all that apply)
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Guidelines for password protecting access to my smartphone 88%
Guidelines for downloading apps to my smartphone 42%
Guidelines for using security software (i.e. antivirus, remote device
lock, remote device wipe) on my smartphone
62%
Guidelines for which smartphones are allowed to connect to
company resources based on platform (i.e. BlackBerry, Android, iOS, 65%
Windows)
8
9. Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
Do you use your work-related smartphone to access information that could be considered sensitive
or confidential?
No
27%
Yes
73%
Are you aware of any mobile device security and/or management software or tools your company uses in
connection with your work-related smartphone?
No
42%
Yes
58%
9
10. Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
What types of information do you access on your phone that could be
considered sensitive or confidential? (Please select all that apply)
0% 10% 20% 30% 40% 50% 60% 70% 80%
Financial data 40%
Employee records 22%
Personally identifiable information 67%
Competitive/proprietary information 73%
10
11. End users don’t fully realize the potentially sensitive
nature of the information stored on smartphones.
Please rank the following items based on the emotional distress each one would cause you if
lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4
being the item that would cause the least emotional distress.
100%
13% 11%
90% 21%
80% 20%
54%
70% 35%
27%
60% 17%
4
50% 3
2
40% 24%
18% 1
39%
30%
52%
20%
20%
27%
10%
13%
8%
0%
Laptop Smartphone Wallet Car keys
11
12. Smartphones rank high on end users’ must-have
technology lists.
Which of the following would you give up before giving up of your
smartphone? (Please select all that apply)
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
MP3 Player 82%
TV 35%
DVR 49%
Laptop 24%
Tablet computer 43%
12
13. Despite being tech savvy smartphone users, some
people just shouldn’t be parents.
Which of the following would you give up before giving
up of your smartphone? (Please select all that apply)
0% 5% 10% 15% 20% 25% 30% 35%
Firstborn child 1%
Favorite food for a year 29%
13
15. Recommendations
• Encrypt the data on mobile devices
• Use security software on your smartphone
• Develop and enforce strong security policies for using mobile devices
• Make sure all software is up-to-date
• Avoid opening unexpected text messages from unknown senders
• Click with caution when engaging in mobile social networking
• Users should be aware of their surroundings when accessing sensitive
information
• Focus on protecting information as opposed to focusing on the
devices
• Know what to do if a device is lost or stolen
• Mobile management is key
15