You will soon receive an email with a link to confirm your access, or follow the link below.
You may now close this message and continue to your article.
Despite rising concerns about everything from breach risks to mobile-driven attacks and potential AI threats survey data leads us to believe that the extent of concern shown by respondents often doesn’t seem to match the risks.
Respondents report high levels of confidence in their mobile defenses across a number of areas. For instance, they expressed a great deal of faith that current mobile device security measures are effective, with 96% asserting that their defenses are at least somewhat effective. This confidence stands in stark contrast to rising reported breach rates.
This confidence stands in stark contrast to rising reported breach rates.
say current mobile device security measures were very effective.
have experienced a security incident involving a mobile or IoT device that resulted in data loss or downtime.
Another area where respondents express high levels of confidence was in their ability to recover quickly from a breach incident.
This, too, is at odds with what respondents said about their actual incident experiences.
are very confident in their ability to quickly recover from a mobile-related compromise.
report that an organizational security incident involving a mobile or IoT device had a major impact—financial or reputational—on their organization.
of those that experienced a mobile- or IoT-related incident say remediation was not simple or cheap.
Despite a professed confidence in their ability to protect against mobile-based threats and recover from incidents, respondents also simultaneously cite persistent mobile security worries. Almost half believe end users are complacent about data privacy and security, oblivious to the dangers of credential theft, and tend to exercise poor security hygiene.
of respondents believe organizations need to take mobile device security more seriously.
of respondents believe mobile-related security risks have increased or significantly increased over the past year.
Part of the problem could be that respondents simply don’t know what they don’t know. With the proliferation of shadow IT, little centralized IT oversight of IoT projects and many employees taking a choose-your-own-adventure approach to home and public Wi-Fi connectivity, security stakeholders face a daunting challenge in accurately assessing the risks.
of respondents do not centrally coordinate IoT projects.
report that IT does not have oversight of IoT projects.
say they are at least somewhat worried about shadow IT.
have no formal disaster recovery plan in place.
lack organization wide security policies.