Technology News  |   Industry News  |   Product News  |   Business News  |   Event News  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  Corporate & Office  |   Education & Institutional  |   Financial  |   Game & Casino  |   Government & Public  |   Homeland Security  |   Hospital & Entertainment  |   IT Asset & Technology  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |   Consulting & Services  |
  Edit Member Profile  |  Edit Company Profile  |  Change Password  |  My Resources Profiles  
  2009 MAR Issue   |   What is Digital Magazine?  |  How to use  |  Archives  |    
 
  SecurityWorldMag.com

SecurityWorld Online Magazine

     All

Theme Tracking

Market Insight

Spotlight

Business & People

Market Insight

Home > Worldwide Security Report > Market Insight

Mobile Security Still Misunderstood

Users are extremely misinformed about security threats

In-Stat projects that over 8 million devices in the U.S. will go missing this year alone.

 

The security of wireless voice services and mobile data are key considerations for users and their employers.  Based upon the results of a recent In-Stat survey, a majority of users overestimates the risk, misunderstands the security threats that do exist, and looks for protection from sources that cannot help.

 

The Problem

 

The current reality is that cellular voice and data services based upon digital technology are as secure as wireline networks.  The bigger problem is that end-users lose, or have stolen, a large number of mobile devices.  Extrapolating from the survey, In-Stat projects that over 8 million devices in the U.S. will go missing this year alone.  Furthermore, smartphone users, the ones with the most access to sensitive information, are 40% more likely to lose a device.

If we look at the projected value of lost mobile devices, we see that smartphones represent a disproportionate value of lost hardware.  This does not include the value of data that could be accessed should an organization not know about the loss of the device.

 

Taking over Control

 

Since it is impractical to ¡°put the genie back in the bottle¡± and limit access to corporate information to landline connections, organizations need to take over at least some control of these devices.  Too many organizations allow end-users to select their own devices, mobile data networks, and degree of access to corporate databases.

The problem with this is that users select the method that is most convenient and costs less, not necessarily the one that is most secure.  Based upon this survey, users are extremely misinformed about security threats.  Most are concerned with problems that have been solved for almost a decade.

 

Getting in Front of Mobile Security

 

Compounding the security problem is that users reject even minimal steps to increase security.  For example, many users resent that a carrier can disable a stolen device and many carriers find that many use default passwords, an obvious security risk.   The first step for organizations to get in front of mobile security is to assume corporate liability for mobile communications.  As long as corporate users pursue individual liability as an acceptable option for business use, it seems inevitable that security breaches will become more common.

 

 

 

 

For more information, please send your e-mails to swm@infothe.com.

¨Ï2007 www.SecurityWorldMag.com. All rights reserved.

 

 

 
 

     Tips for home security providers: Remember the Basics

     U.S. Security Market: Changing Dynamics



Wireless IP Cam...
Home Security S...
IP camera Netwo...
Home l New Product Showcase l Gold Suppliers l Trade Shows l email Newsletter l About SWM l Help l Site Map l Partnerships l Privacy Policy | Newsletter
Publisher: Choi Jung-sik | Edited by: Lee Sang-yul | Youth Protection Officer: Lee Sang-yul
Copyright Notice ¨Ï 2004-2007 www.SecurityWorldMag.com Corporation and its licensors. All rights reserved.