Feeds

Most smartphone users breach employers’ security, says survey

Employees' mobile devices a major safety risk for companies

Secure remote control for conventional and virtual desktops

More than half of mobile device users access their employer's networks every day without permission, a survey has found. More than 80 per cent of users of mobile devices, whose security is not controlled by a company, say they have accessed work information.

Network systems company Juniper Networks surveyed 6,000 mobile device users and found that the use of smartphones and tablet computers poses a potentially major security risk to corporate information.

Consumer-focused devices are often far more poorly protected than laptops or secure email devices that have been designed and configured by a company's own IT department. The survey found that, despite citing information security as a major concern, device owners are using the machines to bypass corporate data protection measures.

"Almost 44 per cent of respondents use their devices for both personal and business purposes," said a Juniper statement. "Eighty-one per cent admit using their devices to access their employer's network without their employer's knowledge or permission and 58 per cent do so every single day."

Those users are not unaware of the dangers of using sophisticated mobile devices; 64 per cent of them are very or extremely concerned about the possibility of identity theft when a device is stolen or lost, according to the survey.

Despite these concerns, owners of smartphones and tablets used them for a wide variety of purposes that would make it easier for thieves to access valuable information.

"More than 76 per cent of consumers surveyed use their smartphones or tablets to access sensitive personal or business information," said the Juniper statement. "Fifty-one per cent [used them] to enter or modify passwords; 43 per cent to access banking or credit card statements; 30 per cent to access utility bills; 20 per cent to share financial information such as credit card numbers; 18 per cent to access employer's proprietary information; 17 per cent to access medical records; and 16 per cent to share social security numbers."

"Smartphones and tablets have become the new onramp for information, applications and commerce, yet they are quickly becoming an onramp for security threats as well," said Mark Bauhaus of Juniper Networks. "Fortunately, users are growing very aware of the security, identity and privacy issues involved. Now the industry needs to step up and make security an integrated part of the mobile experience, not an optional afterthought."

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
Back to the ... drawing board: 'Hoverboard' will disappoint Marty McFly wannabes
Buzzing board (and some future apps) leave a lot to be desired
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.