the impact of mobile devices on information security · the impact of mobile devices on information...

10
THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS October 2014 Sponsored by

Upload: others

Post on 19-Sep-2019

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

October 2014

Sponsored by

Page 2: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

© 2014 Dimensional Research.All Rights Reserved. www.dimensionalresearch.com

IntroductionMobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments, while the Bring Your Own Device (BYOD) movement has dramatically increased the number of expensive security incidents. In recent months, we have seen several highly visible, high-impact corporate hacks. These highly publicized breaches have significant financial impact as well as risk to the company’s reputation. Mobile security is of utmost concern as the number of personal devices connecting to corporate networks continues to grow.

The following report, sponsored by Check Point, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic sponsored by Check Point and this report evaluates differences in responses to similar questions asked over the past two years.

Executive Summary1. Number of personal mobile devices connecting to corporate networks continues to grow 2. The cost of remediating mobile security incidents continues to increase3. Employeebehaviorisasignificantfactorinmobilesecurity

Key Findings• Numberofpersonaldevicesconnectingtocorporatenetworkscontinuestogrow

- 75% allow personal devices to connect to corporate networks, an increase from 67% in 2013 and 65% in 2012 - 91% say the number of personal devices connecting to corporate networks is growing - 72% more than doubled the number of connected personal mobile devices in the past two years

• Mobilesecurityincidentsareontherise,andsoisthecostoffixingthem - 82% of security professionals expect mobile security incidents to increase this year - 98% have concerns about the impact of a mobile security incident - 95% face challenges with the security of BYOD - 64% say cost of remediating mobile security incidents is increasing - 42% of executives say a mobile security incident costs more than $250,000 - 64% cite Android as the mobile platform with the greatest risk, up from 49% in 2013 and 30% in 2012

• Employeebehaviorisasignificantfactorininformationsecurity - 87% say careless employees are a greater threat to security than cybercriminals, up from 72% in 2012 - Employee actions have the highest impact on vulnerability of mobile data - 63% say employees likely contributed to recent high-profile security breaches - 92% say employee behaviors could have made a difference in preventing high-profile security breaches - 56% are managing business data on employee-owned personal devices, up from 37% in 2013

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

Sponsored by

Page 3: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 3

Detailed FindingsContinued growth in the number of companies with mobile devices connecting to corporate networks IT professionals were asked if mobile devices, such as smartphones or tablets, were allowed to connect to their corporate networks. Most reported broad use of mobile devices within their organizations, with 95% saying that they had mobile devices connecting to corporate networks, including 74% who allowed both personal and company owned devices, 20% who allowed only company-owned mobile devices, and 1% that had only personal mobile devices. The 1% all worked at small companies.

This is a slight increase in the number of companies that allow mobile devices on their corporate networks compared to 93% in 2013.

More corporate networks include personal devicesIf we consider only personally-owned mobile devices connecting to corporate networks, 2014 has seen a more significant growth rate than in the past. In 2014, 75% of IT professionals reported that devices owned personally by employees, contractors, or others connect to their corporate networks, up from 67% in 2013 and 65% in 2012.

Yes  95%  

No  5%  

Mobile  devices  connect  to  corporate  networks  

65%  

67%  

75%  

35%  

33%  

25%  

0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%  

2012  

2013  

2014  

Companies  allowing  personal  mobile  devices  to  connect  corporate  networks  

Yes  

No  

Page 4: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 4

Companies have an increasing number of personal mobile devices connecting to their networksIT professionals whose companies do allow personally-owned mobile devices were asked how much growth there has been in the number of personal devices on their corporate networks. The vast majority, 91%, have seen an increase in the number of mobile devices connecting to corporate networks over the past two years. For most participants, the increase was very dramatic with 72% saying they more than doubled the number of personal mobile devices in this timeframe.

Mobile security incidents expected to grow With the high rate of growth of mobile devices, particularly personal mobile devices connecting to corporate networks, it is unsurprising that the number of security incidents is also expected to grow. Among all IT professionals, about two-thirds (64%) expected to see an increase in the number of mobile security incidents.

Interestingly, IT professionals in general were more optimistic than the IT professionals who focus exclusively on security as their entire job. Among the security professionals who spend all their time thinking about securing corporate data and systems, a shocking 82% expect the number of security incidents to increase. Not a single dedicated security professional (0%) indicated that they expected the number of mobile security incidents to decrease this year, although among all IT professionals, including those for whom security was only part of their job, 7% felt that the steps they were taking to ensure security would decrease the number of security incidents.

No  increase  9%  

Less  than  twice  as  many  19%  

Between  2    and  5  8mes    

46%  

More  than  5  8mes      26%  

Increase  in  number  of  personal  devices  connec3ng  to  corporate  networks  

Increase  64%  

Decrease  7%  

No  change  29%  

Expected  change  in  number  of  security  incidents  in  coming  year    

(All  IT  professionals)  

Increase  82%  

Decrease  0%  

No  change  18%  

Expected  change  in  number  of  security  incidents  in  coming  year    

(Dedicated  security  professionals  only)  

Page 5: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 5

IT professionals are concerned about the business impact of mobile security incidents Nearly all IT professionals (98%) have concerns about the impact of a mobile security incident. When asked about their greatest concerns, lost or stolen information topped the list with 82% of IT professionals citing this as an issue, followed by 61% who worried about introducing security weaknesses for future attacks.

Participants who took the time to write in “Other” answers specifically called out worries about reputation and bad press, loss of productivity while correcting problems, and costs to stay within security standards and compliance.

Securing corporate information remains greatest challenge in adopting BYOD BYOD or “Bring Your Own Device” continues to cause challenges for corporate IT. The majority of participants, 95%, reported that when employees use their own smartphones, tablets, or other devices to work with business information, it creates security challenges.

IT professionals report that the most common challenge faced by IT organizations in adopting a BYOD policy is securing corporate information (72%), followed by managing personal devices that contain corporate and personal data and applications (67%), and tracking and controlling access to corporate and private networks (59%).

2%  

3%  

31%  

43%  

61%  

82%  

0%   10%   20%   30%   40%   50%   60%   70%   80%   90%  

No  concerns  

Other  

Cost  of  replacing  lost  or  stolen  devices  

Compliance  violaAon  and  fines  

IntroducAon  of  security  weakness  for  future  aHacks  

Lost  or  stolen  informaAon  

Mobile  security  incident  concerns  

5%  

2%  

42%  

46%  

59%  

67%  

72%  

0%   10%   20%   30%   40%   50%   60%   70%   80%  

We  have  no  challenges  with  BYOD  

Other  

Finding  agnosBc  security  soluBons  (i.e.  managing  all  OSes)  

Keep  device  operaBng  system  and  applicaBons  updated  

Tracking  and  controlling  access  to  corporate  and  private  networks  

Managing  personal  devices  that  contain  both  corporate  and  personal  data  and  applicaBons  

Securing  corporate  informaBon  

BYOD  security  challenges  

Page 6: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 6

The specific challenges and importance of the challenges did not change significantly from year to year, but the overall number of IT professionals facing security concerns as well as the number concerned about particular items, has increased across the board. The overall number of IT professionals who face security challenges rose from 93% in 2013 to 95% in 2014. Most challenges saw a slight in increase in number of IT professionals experiencing them, for example concerns about securing corporate information rose from 67% in 2013 to 72% in 2014.

Interestingly, there was a dramatic increase in the ability to finding agnostic security solutions that can manage all operating systems across the wide range of mobile devices used. In 2013 only 14% listed finding agnostic security solutions as a top concern, but in 2014 that number rose dramatically to 42%.

Cost of remediating security incidents is increasingThe costs of remediating a security incident can be wide-ranging once you include staff time, legal fees, fines, resolution processes, and other expenses for each incident where corporate information has been lost or stolen from a mobile device. Most IT professionals (64%) report that the costs of remediating mobile security incidents is increasing, with only a small number (6%) reporting these costs are decreasing.

7%  

14%  

38%  

59%  

63%  

67%  

5%  

42%  

46%  

59%  

67%  

72%  

0%   10%   20%   30%   40%   50%   60%   70%   80%  

We  have  no  challenges  with  BYOD  

Finding  agnosAc  security  soluAons  (i.e.  managing  all  OSes)  

Keep  device  operaAng  system  and  applicaAons  updated  

Tracking  and  controlling  access  to  corporate  and  private  networks  

Managing  personal  devices  that  contain  both  corporate  and  personal  data  and  applicaAons  

Securing  corporate  informaAon  

BYOD  security  challenges  (2013  vs.  2014)  

2014  

2013  

Increasing  64%  

Decreasing  6%  

No  change  30%  

Changing  costs  of  remedia1ng  mobile  security  incidents  

Page 7: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 7

Because of this wide range of possible expenses, the actual cost of a mobile security incident can be challening to calculate. IT executives had the most visibility into these costs, which can be substantial. Three-quarters (75%) of IT executives reported that a mobile security incident costs their company more than $10,000, including 42% who said it cost more than $250,000. This is an increase from 2013 where only 37% reported a mobile security incident cost more than $250,000.

Perception of Android security risks grew again in 2014IT professionals were asked which of the most common mobile platforms they viewed as being the greatest risk to their corporate security. The number of IT professionals saying Android was the riskiest increased and was by far the most frequent platform indicated (64%), followed by Apple/iOS (16%) and Windows Mobile (16%) and Blackberry (4%).

Perception of Android security problems continued to grow dramatically as the platform perceived to have the greatest security risk (up from 49% in 2013 and 30% in 2012).

Apple/iOS decreased in perception as the riskiest mobile platform for the first time since this survey began, to 16% from 25% in both of the prior years. Windows Mobile saw about the same results after dropping considerably from 2012 to 2013. Blackberry dropped for the 2nd year in a row as the number of IT professionals who viewed this as the most risky platform decrease by more than a half.

28%  

25%  

35%  

33%  

37%  

42%  

0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%  

2013  

2014  

Cost  of  mobile  security  incidents  (Execu'ves)  

Less  than  $10,000  

$10,000  -­‐  $250,000  

More  than  $250,000  

Mobile platform perceived as greatest security risk(2012 vs. 2013 vs. 2014)

25%

25%

16%

30%

49%

64%

29%

17%

16%

16%

9%

4%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

2012

2013

2014Apple/iOS

Android

Windows Mobile

Blackberry

Page 8: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 8

Concern about careless employees is growing Employee behavior was found to have significant impacts on mobile security in this year’s survey. IT professionals were asked which group of individuals was considered the greatest security risk —careless employees or cybercriminals who intentionally try to steal corporate information. Careless employees continued to be reported as a greater security threat than cybercriminals with 87% of participants citing careless employees as the greatest security risk as opposed to only 13% citing cybercriminals. This is a notable increase from 2012 when the same question was asked and 72% cited careless employees. This reinforces the importance of implementing a strong combination of technology and security awareness throughout an organization.

Employee actions have highest impact on vulnerability of mobile dataMobile security incidents can have a wide range of impacts. IT professionals were presented with a list of possible impacts and asked to rank them from first to last with the first being the factor that was the most impactful and the last being the factor that was the least impactful. Last year, lost or stolen devices was ranked first among IT professionals as the factor that had the greatest impact on the vulnerability of mobile data, followed by malicious applications downloaded to the mobile device.

In 2014, the role of employees rose significantly and is now represented in all the biggest impacts on the vulnerability of mobile data. This includes employees accidentally accessing malicious sites or downloading malicious content, lack of employee awareness about security policies, and employees intentionally ignoring security policies all surpassing lost or stolen mobile devices with corporate data.

72%  

87%  

28%  

13%  

0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%  

2012  

2014  

Greater  security  threat  to  mobile  devices  

Careless  employees  

Hackers  

6.  High  rate  of  users  changing  or  upgrading  their  mobile  device  

5.  Security  updates  not  kept  current  

4.  Lost  or  stolen  mobile  devices  with  corporate  data  

3.  Employees  intenAonally  ignoring  security  policies  

2.  Lack  of  employee  awareness  about  security  policies  

1.  Employees  accidentally  accessing  malicious  sites  or  downloading  malicious  content  

Impact  on  the  vulnerability  of  mobile  data  

Page 9: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 9

Employee behavior can make a difference in preventing security reputation eventsEmployee adherence to corporate security policies whether it be lack of awareness of security policies or employees intentionally ignoring security policies were ranked among the highest impacts on the vulnerability of mobile data. Recent months have seen a large number of very high profile customer data breaches. IT professionals were also asked if they felt employee behavior could have made a difference in preventing these embarrassing and customer-impacting issues.

Two-thirds of participants (63%) indicated that it is likely employee carelessness contributed to recent high-profile breaches of customer data. The vast majority (92%) said that in their opinion employee behaviors could have made a difference.

More companies are managing employee-owned devices Once corporate data is on personal devices, it becomes a security risk point if those are not managed properly. In 2014 there was a significant increase in the number of IT organizations managing business data on the personal devices that employees use for work. More than half of organizations (56%) are managing the business data that exists on personal devices, up significantly from just over one-third (37%) in 2014.

5%  

58%  

30%  

8%  

0%   10%   20%   30%   40%   50%   60%   70%  

Employee  carelessness  caused  these  problems  

It  is  likely  employee  carelessness  contributed  

It’s  possible  it  might  have  made  a  difference    

It  wouldn’t  have  made  a  difference  

Likelihood  recent  high-­‐profile  breaches  could  have  been    prevented  if  employees  followed  security  policies    

63%  

44%  

37%  

56%  

0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   100%  

2013  

2014  

Manage  business  data  on  personal  devices  

No  

Yes  

Page 10: THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY · the impact of mobile devices on information security: a survey of it and security professionals october 2014 sponsored by

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT AND SECURITY PROFESSIONALS

Dimensional Research | October 2014

www.dimensionalresearch.com © 2014 Dimensional Research.All Rights Reserved. Page 10

Survey MethodologyAn independent database of IT and security professionals was invited to participate in a web survey on the topic of mobile devices and information security sponsored by Check Point. A total of 706 respondents across the United States, Canada, United Kingdom, Germany, Australia and New Zealand completed the survey. Each respondent had responsibility for securing company systems. Participants included IT executives, IT managers, and hands-on IT professionals, and represented a wide range of company sizes and industry verticals.

This survey is the third in a series of surveys on this topic sponsored by Check Point. This report compares certain results to the results of similar questions asked in the past two years.

About Dimensional ResearchDimensional Research® provides practical marketing research to help technology companies make their customers more successful. Our researchers are experts in the people, processes, and technology of corporate IT and understand how IT organizations operate. We partner with our clients to deliver actionable information that reduces risks, increases customer satisfaction, and grows the business. For more information visit www.dimensionalresearch.com.

About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

5  to  100  17%  

100  to  1,000  29%  

1,000  to  5,000  23%  

5,000  to  15,000  15%  

More  than  15,000  16%  

Company  size  

IT  execu(ve  26%  

IT  team  manager  

34%  

Front-­‐line  IT  professional  

40%  

Job  func)on  

IT  security  is  my  en.re  job  

27%  

IT  security  is  part  of  my  job  

73%  

Responsibility  for  IT  security