According to Forrester’s Global Business Technographics Devices And Security Workforce Survey, 2016, 44% of employees think their employer should handle mobile security on their device and 26% of employees said they prefer to choose a security solution on their own. With or without the proper security measures, employees are using smartphones and tablets to access the following types of sensitive data for work:

  • Customer PII (Personally Identifiable Information)
  • Contracts
  • Passwords
  • IP belonging to the company (Intellectual Property)
  • Customer service data
  • Competitive data
  • Non-public corporate financial or strategy information relating to the company
  • Invoices and customer orders

If employees aren’t worried about security, you should be…

The mobile mind shift has transformed the workforce forever.

Your employees expect information and services to be available on any device, in any context, at their exact moment of need. Moreover, employees are no longer willing to wait around for S&R (security & risk) leaders to provision them with the mobile devices, apps, and access they need to serve customers. S&R leaders must recognize and accept the following 2 things.

1. The line between work use and personal has blurred — permanently.

The days of people using a separate mobile device strictly for work purposes have disappeared. In fact, 68% of global enterprise information workers are choosing their smartphones for work, and 69% say the same for tablets. In addition, 16% of people who use mobile devices for work have personally paid for their own email application, while 12% have personally paid for their own web browser app, instant messaging, or calendar app. Many of these devices access sensitive corporate data, and most employees prefer (or expect) their employer to handle security on these devices. S&R leaders must become champions of worker productivity with mobile enablement strategies that limit the organization’s exposure to data loss without dramatically affecting employee productivity.

2. Mobile security remains a common vector for data loss or attack.

According to Forrester’s Business Technographics® survey data, many employees access sensitive content such as customer information, nonpublic financial data, intellectual property, and corporate strategy materials from their mobile devices. Considering that 40% of the enterprise network security decision-makers who reported an external breach in the past 12 months reported an attack
involving an employee-owned device, it’s clear that despite all of the available technologies for mobile security, it remains a major challenge. And as the number of mobile apps and versions increases, the potential attack surface expands significantly.

Don’t be caught unaware. Mobile security must be a priority.. preferably proactively rather than re-actively. Schedule a consultation with Flagship to learn more about the best approach to securing your employee’s mobile devices.

If you liked this blog, you might also like: The Role of Managed Services in Cybersecurity

logo-ibmStay connected online:

Facebook | Twitter | LinkedIn | Instagram

Subscribe to our newsletter:

IBM Security

IBM's integrated solutions harness security-relevant information from across your organization, and use analytics and automation to provide context and help you detect threats faster, identify vulnerabilities, prioritize risks, perform forensics analysis and automate compliance activities. 

Video: IBM Watson: Taking on the Cybercriminals | WIRED

The sixth and final installment in the Cognitive Insight series highlights how IBM Watson is being trained to take on the cybercriminals.Read more: http://www.wired.co.uk/article/a-new-line-of-defence-in-cybersecuritySubscribe to WIRED►► http://po.st/SubscribeWiredCONNECT WITH WIREDWeb: http://po.st/WiredVideoTwitter: http://po.st/TwitterWiredFacebook: http://po.st/FacebookWiredGoogle+: http://po.st/GoogleWiredInstagram: http://po.st/InstagramWiredMagazine: http://po.st/MagazineWiredNewsletter: http://po.st/NewslettersWiredABOUT WIREDWIRED brings you the future as it happens – the people, the trends, the big ideas that will change our lives. An award-winning printed monthly and online publication. WIRED is an agenda-setting magazine offering brain food on a wide range of topics, from science, technology and business to pop-culture and politics.IBM Watson: Taking on the Cybercriminals | WIREDhttps://www.youtube.com/user/WiredVideoUK

www.youtube.com

Video: Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar

Security teams can be overwhelmed by a sea of vulnerabilities–without the contextual data to help them focus their efforts on the weaknesses that are most likely to be exploited. Cyberthreats need to be stopped before they cause significant financial and reputation damage to an organization. You need an endpoint security platform that can detect threats, prioritize risks and respond within minutes to shut down an attack or vulnerability that could compromise your endpoints.IBM BigFix seamlessly integrates with IBM QRadar to provide closed loop vulnerability management, accelerating risk prioritization and incident response to mitigate potential attacks giving you an integrated threat protection system to keep your endpoints and data secure.For more information, please visit http://ibm.co/1oSThIF

www.youtube.com

Infographic: A survey of the cyber security landscape

Understand the threat landscape to improve your security posture. There’s very little that cyber criminals can do today that’s truly new—and yet, 2015 was filled with serious incidents across the entire industry. View our 2016 Cyber Security Intelligence infographic to learn more, and determine what you can do to improve your security posture.

Video: Endpoint Management with IBM BigFix

Discover, manage and control your endpoints–in real time. With IBM BigFix, you can find and fix problems in minutes with real-time visibility and control into all your endpoints. Our single-console, single-agent, single-server architecture helps reduce the cost, risk and effort of managing virtually any mix of endpoints—so you can focus on higher value projects for increased productivity.To learn more about IBM BigFix, please visit http://ibm.co/1Ok4bBs

www.youtube.com

Video: IBM MaaS360 Enterprise Mobility Management

IBM MaaS360 has massively redefined mobile security and productivity for enterprise management. Identity and access, malware protection and a containerized environment that feels native await inside your free 30 day trial. Start managing iOS, Android and Windows phones and tablets today https://ibm.biz/Bd4a8g

www.youtube.com

Study: 2016 Cost of Data Breach Study: Global Analysis

IBM and Ponemon Institute released the 2016 Cost of Data Breach Study: Global Analysis. According to this research, the average total cost of a data breach for the 383 companies participating in this research increased from $3.79 to $4 million. The average cost paid for each lost or stolen record containing sensitive and confidential information increased from $154 in 2015 to $158 in this year’s study.Read the complete report to learn more.