Check Point’s Third Annual Mobile Security Survey Highlights Careless Employees as Greatest Mobile Security Threat
October 2014 by Check Point
Check Point has published its third mobile security report, revealing that 95% of respondents face challenges with securing and supporting Bring Your Own Device (BYOD) – highlighting the need for more robust security solutions for personal devices tied to the corporate network.
Based on a survey of over 700 IT professionals, the report highlights the ongoing concern at the ease of transporting sensitive corporate information outside of managed environments and details the potential mobile security threats due to lack of employee security awareness or training.
The key findings include:
• The biggest threat resides within organisations – 87% of respondents believed that the greater security threat to mobile devices were careless employees. Nearly two-thirds of respondents believed that recent high-profile breaches of customer data were likely due to employee carelessness.
• Cost of mobile security incidents continues to rise – 2014 saw an increase in remediation costs for mobile security incidents. Of the IT executives surveyed, 42% noted that mobile security incidents cost their organizations more than $250,000.
• Proliferating use of personal mobile devices on corporate networks – Despite careless employees being the weakest link into businesses, 91% of IT professionals saw an increase in the number of personal mobile devices connecting to their networks over the past two years. In 2014, 56% of those surveyed managed business data on employee-owned devices, up from 37% in 2013.
• Mobile security incidents expected to rise – 2015 is shaping up to be a risky year, according to those surveyed. Of the security professionals surveyed this year, 82% expect the number of security incidents to grow in 2015. Additionally, nearly all of the respondents (98%) expressed their concern about the impact of a mobile security incident, with the greatest concern being the potential for lost and stolen information.
• Android continues to be perceived as having the greatest security risks – Android risk increased from 49% in 2013 to 64% this year, as the platform with greatest perceived security risk – as compared to Apple, Windows Mobile, and Blackberry.
The 2014 Mobile Security Report coincides with the launch of Check Point Capsule, a single mobile solution that protects business data and mobile devices, everywhere, enabling:
Secure access to work: it protects business data on mobile devices, without having to manage the entire device. Capsule creates a secure business environment and separates business data from personal data and applications on mobile devices. This enables users to securely use business applications through a simple user interface without affecting their personal data.
Safe business documents: Prevents internal and external data leakages by attaching security that travels with the document. Capsule secures business documents everywhere; authorized users can access a protected document seamlessly and transparently on any device.
Protection from threats everywhere: Extends the corporate security policy to protect devices from threats when outside of the corporate network. Capsule scans all traffic from mobile devices in the cloud and prevents access to malicious files and websites, bot damage, and other cyber threats. It supports device platforms and operating systems including iOS, Android, Windows and MacOS.
“Through our 2014 Mobile Security Survey, it is clear that IT professionals are not seeing an end to mobile security threats, and in fact, are preparing for an increase of these incidents in 2015,” said Dorit Dor, vice president of product at Check Point Software Technologies. “Today we announced the Check Point Capsule, which helps to solve these challenges as a complete mobile solution that ensures seamless security regardless of where the data or device goes.”
About the Report:
The report, The Impact of Mobile Devices on Information Security, surveyed over 700 IT professionals in the United States, Australia, Canada, Germany, and United Kingdom. This is the third survey on this topic, and the report evaluates differences in responses to similar questions asked over two years. The goal of the survey was to gather data to quantify the impact of mobile devices on corporate information security.