Feeds

Most smartphone users breach employers’ security, says survey

Employees' mobile devices a major safety risk for companies

Application security programs and practises

More than half of mobile device users access their employer's networks every day without permission, a survey has found. More than 80 per cent of users of mobile devices, whose security is not controlled by a company, say they have accessed work information.

Network systems company Juniper Networks surveyed 6,000 mobile device users and found that the use of smartphones and tablet computers poses a potentially major security risk to corporate information.

Consumer-focused devices are often far more poorly protected than laptops or secure email devices that have been designed and configured by a company's own IT department. The survey found that, despite citing information security as a major concern, device owners are using the machines to bypass corporate data protection measures.

"Almost 44 per cent of respondents use their devices for both personal and business purposes," said a Juniper statement. "Eighty-one per cent admit using their devices to access their employer's network without their employer's knowledge or permission and 58 per cent do so every single day."

Those users are not unaware of the dangers of using sophisticated mobile devices; 64 per cent of them are very or extremely concerned about the possibility of identity theft when a device is stolen or lost, according to the survey.

Despite these concerns, owners of smartphones and tablets used them for a wide variety of purposes that would make it easier for thieves to access valuable information.

"More than 76 per cent of consumers surveyed use their smartphones or tablets to access sensitive personal or business information," said the Juniper statement. "Fifty-one per cent [used them] to enter or modify passwords; 43 per cent to access banking or credit card statements; 30 per cent to access utility bills; 20 per cent to share financial information such as credit card numbers; 18 per cent to access employer's proprietary information; 17 per cent to access medical records; and 16 per cent to share social security numbers."

"Smartphones and tablets have become the new onramp for information, applications and commerce, yet they are quickly becoming an onramp for security threats as well," said Mark Bauhaus of Juniper Networks. "Fortunately, users are growing very aware of the security, identity and privacy issues involved. Now the industry needs to step up and make security an integrated part of the mobile experience, not an optional afterthought."

Copyright © 2010, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

The Power of One Infographic

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.