is your mobile workforce beach ready? - sap infographic

1
Is Your Mobile Workforce Beach Ready? Does that productivity boost come with too much of a risk? Watch out! Of the 70M smartphones lost each year, only 7% are recovered. 1 Here are the most popular places to lose your phone on vacation. 2 Watch out for pickpockets! The cost of a mobile data breach will sink you and your company 174M records were stolen in data breaches 4 $5.5M Average cost of a breach 37% require employees to lock screens 24% use security software 21% use mobile application management software 17% make employees report issues quickly 11% restrict downloads 7% build an internal app store 6% installed location tracking software on devices Watch out! Criminals and hackers don’t go on vacation. While you’re out travelling and exploring the world, they may be exploring the confidential data on your device! A comprehensive approach to mobile security is the only way to be sure you can fully relax on your vacation and when you get back to the office. ©2013 SAP AG. SAP and the SAP logo are trademarks and registered trademarks of SAP in Germany and several other countries. Secure your Devices, Apps and Content with SAP Mobile Secure. Learn more at sap.com/mobile/emm. of BYOD activity is unmanaged. Can you bear a data breach at the beach? Are you thinking about using your personal mobile device to stay connected to work on summer vacation? 25% sightseeing 23% airport 22% hotel 18% public transportation 12% rental car When people use mobile apps for work, there is a 80% But there is a security risk since increase in productivity 45% Sunscreen won’t protect your data! 73% of employees said they access information that could be considered sensitive or confidential 8 67% don’t use a security solution for their mobile devices 1 59% report that employees circumvent or disengage security features such as passwords and key locks 6 51% experience data loss resulting from employee use of unsecured mobile devices 6 42% send work related docs BUT 40% don’t use complex passwords or change their passwords regularly 1 There’s no time to relax when you’re managing mobile security. Here are some strategies that IT departments are implementing today. 3 More than 75% of all malicious code has basically one goal: to steal your data. Top mobile threats by type: 28% collects device data 25% tracks user 24% sends content Major causes of a data breach? 7 37% Malicious attacks 35% Negligence/Human factor 29% System glitches 1 Intuition, Post PC Era; 2012. 2 Huffington Post, Most likely places to lose cell phone traveling; 2013. 3 ReadWrite Survey Results: What A Typical BYOD Program Really Looks Like, 2013. 4 Savid Technologies, Infographic: Mobile Security, 2013. 5 Norton, Cybercrime Report; 2013. 6 PR Newswire, Survey Says 51 Percent of Organizations Lose Data Through Mobile Devices, 59 Percent of Employees Dodge Security Controls; 2013. 7 Bank Info Security, Regulations' Impact on Data Breach Costs by Eric Chabrow; 2013.

Upload: ideba

Post on 20-Jul-2015

82 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Is Your Mobile Workforce Beach Ready? - SAP Infographic

Is Your Mobile Workforce Beach Ready?

Does that productivity boost come with too much of a risk?

Watch out! Of the 70M smartphones lost each year, only 7% are recovered.1

Here are the most popular places to lose your phone on vacation.2

Watch out for pickpockets!

The cost of a mobile data breach will sink you and your company

174M records were stolen in data breaches4

$5.5M Average cost of a breach

37% require employees to lock screens

24% use security software

21% use mobile application management software

17% make employees report issues quickly

11% restrict downloads

7% build an internal app store

6% installed location tracking software on devices

Watch out! Criminals and hackers don’t go on vacation.

While you’re out travelling and exploring the world, they may be exploring the confidential data on your device!

A comprehensive approach to mobile security is the only way to be sure you can fully relax on your vacation and when you get back to the office.

©2013 SAP AG. SAP and the SAP logo are trademarks and registered trademarks of SAP in Germany and several other countries.

Secure your Devices, Apps and Content with SAP Mobile Secure. Learn more at sap.com/mobile/emm.

of BYOD activity is unmanaged. Can you bear a data breach at the beach?

Are you thinking about using your personal mobile device to stay connected to work on summer vacation?

25% sightseeing

23% airport

22% hotel

18% public transportation

12% rental car

When people use mobile apps for work, there is a

80%

But there is a security risk since

increase in productivity 45%

Sunscreen won’t protect your data!

73%of employees said they access information that could be considered sensitive or confidential8

67% don’t use a security solution for their mobile devices1

59% report that employees circumvent or disengage security features such as passwords and key locks6

51%

experience data loss resulting from employee use of unsecured mobile devices6

42% send work related docs BUT

40% don’t use complex passwords or change their passwords regularly1

There’s no time to relax when you’re managing mobile security.

Here are some strategies that IT departments are implementing today.3

More than 75% of all malicious code has basically one goal: to steal your data.

Top mobile threats by type:

28% collects device data

25% tracks user

24% sends content

Major causes of a data breach?7

37% Malicious attacks

35% Negligence/Human factor

29% System glitches

1 Intuition, Post PC Era; 2012.

2 Huffington Post, Most likely places to lose cell phone traveling; 2013.

3 ReadWrite Survey Results: What A Typical BYOD Program Really Looks Like, 2013.

4 Savid Technologies, Infographic: Mobile Security, 2013.

5 Norton, Cybercrime Report; 2013.

6 PR Newswire, Survey Says 51 Percent of Organizations Lose Data Through Mobile Devices, 59 Percent of Employees Dodge Security Controls; 2013.

7 Bank Info Security, Regulations' Impact on Data Breach Costs by Eric Chabrow; 2013.