is your mobile workforce beach ready? - sap infographic

Post on 20-Jul-2015

82 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Is Your Mobile Workforce Beach Ready?

Does that productivity boost come with too much of a risk?

Watch out! Of the 70M smartphones lost each year, only 7% are recovered.1

Here are the most popular places to lose your phone on vacation.2

Watch out for pickpockets!

The cost of a mobile data breach will sink you and your company

174M records were stolen in data breaches4

$5.5M Average cost of a breach

37% require employees to lock screens

24% use security software

21% use mobile application management software

17% make employees report issues quickly

11% restrict downloads

7% build an internal app store

6% installed location tracking software on devices

Watch out! Criminals and hackers don’t go on vacation.

While you’re out travelling and exploring the world, they may be exploring the confidential data on your device!

A comprehensive approach to mobile security is the only way to be sure you can fully relax on your vacation and when you get back to the office.

©2013 SAP AG. SAP and the SAP logo are trademarks and registered trademarks of SAP in Germany and several other countries.

Secure your Devices, Apps and Content with SAP Mobile Secure. Learn more at sap.com/mobile/emm.

of BYOD activity is unmanaged. Can you bear a data breach at the beach?

Are you thinking about using your personal mobile device to stay connected to work on summer vacation?

25% sightseeing

23% airport

22% hotel

18% public transportation

12% rental car

When people use mobile apps for work, there is a

80%

But there is a security risk since

increase in productivity 45%

Sunscreen won’t protect your data!

73%of employees said they access information that could be considered sensitive or confidential8

67% don’t use a security solution for their mobile devices1

59% report that employees circumvent or disengage security features such as passwords and key locks6

51%

experience data loss resulting from employee use of unsecured mobile devices6

42% send work related docs BUT

40% don’t use complex passwords or change their passwords regularly1

There’s no time to relax when you’re managing mobile security.

Here are some strategies that IT departments are implementing today.3

More than 75% of all malicious code has basically one goal: to steal your data.

Top mobile threats by type:

28% collects device data

25% tracks user

24% sends content

Major causes of a data breach?7

37% Malicious attacks

35% Negligence/Human factor

29% System glitches

1 Intuition, Post PC Era; 2012.

2 Huffington Post, Most likely places to lose cell phone traveling; 2013.

3 ReadWrite Survey Results: What A Typical BYOD Program Really Looks Like, 2013.

4 Savid Technologies, Infographic: Mobile Security, 2013.

5 Norton, Cybercrime Report; 2013.

6 PR Newswire, Survey Says 51 Percent of Organizations Lose Data Through Mobile Devices, 59 Percent of Employees Dodge Security Controls; 2013.

7 Bank Info Security, Regulations' Impact on Data Breach Costs by Eric Chabrow; 2013.

top related