subscribe: Daily Newsletter

 

Gap between real and perceived vulnerability

0 comments

Despite extensive resources dedicated to mobile security, many IT decision-makers remain concerned about the level of vulnerabilities that persist.
New global research initiative conducted by BlackBerry surveyed 1 000 executives from seven countries across a wide range of vertical industries, including financial services, government and healthcare.
The survey reveals that 73% of organizations have a mobile security strategy in place, but only 3% say they have implemented the highest levels of security possible. This is in part because of user attitudes – 82% of the executives admit mobile security precautions cause at least some frustration among employees, and potentially hinder productivity.
Overall, 44% fear that too much mobile security will prevent employees from doing their job.
This fear of implementing a stronger mobile environment led to a startling majority, 86%, of executives who said they are worried about the level of protection for their organisation with half saying they will experience more security breaches through mobile devices. Part of the reason organizations are opening themselves up to these risks is because of the growing trend of BYOD – where despite the popularity, almost half believe that supporting a BYOD policy is a risk.
A critical element to a successful BYOD or COPE (corporate owned, personally enabled) mobile environment is ensuring the isolation and separation of personal and business mobile data, also known as containerization. However, nearly 45% have no containerization technology in place.
“The frequency and severity of malicious attacks have made mobile security the center of attention for CEOs and boards of directors, but doing enough to mitigate risk is still a persistent problem that needs to be solved. This is especially true as the constant adoption of new technologies regularly brings the potential for new vulnerabilities, which can offset the benefits,” says David Kleidermacher, chief security officer at BlackBerry. “We have also heard many of our customers say that security policies can be perceived as a hindrance.
“However, senior executives in every function, and even in the boardroom, need to forcefully communicate that effective mobile security enhances productivity instead of obstructing it.”
The research also uncovered that nearly half of organizations do not have a security incident response team (SIRT) in place, despite the fact that SIRT is an industry best practice to reduce the cost of data breaches. IT decision-makers also want and seek outside help when it comes to securing their mobile environments. Of those surveyed, 59% report that external expertise is the best option for reviewing mobile practices.
The numbers are just as pronounced and even more so when analyzing specific industries.
Only around four in 10 respondents’ organizations have a mobile device management strategy in place. Of these respondents, many felt their organisation’s mobile device security strategy is not good enough, specifically:
* Financial services: 44%
* Government: 52%
* Healthcare: 37%
* Legal: 54%
Overall, 47 % believe that popular BYOD policies leave the company vulnerable to too many risks, and those concerns are reflected in different sectors:
* Financial services: 55%
* Healthcare: 50%
* Government: 43%
* Legal: 53%
Seventy-three percent see mobile security controls as either an “obstruction” or a “complete obstruction,” and the problems are even worse in some industries:
* Financial services: 78%
* Healthcare: 78%
* Government: 85%
* Legal: 94%
However, there is general agreement that a strong mobile security posture can offer great benefits:
* 67% say their data is more secure;
* 64% see increased mobility for employees;
* 51% have experienced fewer security breaches;
* 50% find it easier to comply with regulations; and
* Enhanced compliance is a benefit for financial services (55%), healthcare (54%) and IT/computer services (65%).
“All mobile security policies must be consistently evaluated and tweaked, but also regularly overhauled,” says Kleidermacher. “BlackBerry recognizes that security is a dynamic field, and even the best defensive strategies and technologies today may be inadequate tomorrow. Therefore, the optimal strategy is one that secures the mobile enterprise while boosting convenience and productivity, and can then be adapted to combat new vulnerabilities as they arise.
“BlackBerry continues to integrate key capabilities into its enterprise software portfolio to provide organizations the flexibility they need as they use mobility to empower IT decision makers and employees.”