Welcome!

News Feed Item

'Security Is Not My Responsibility' According to Enterprise Workers Polled in Absolute Software Research

The Value of Corporate Data on Mobile Devices is Significantly Underrated by Enterprise Employees

VANCOUVER, March 5, 2014 /PRNewswire/ - Absolute® Software Corporation (TSX: ABT), the industry standard for persistent endpoint security and management solutions for computers, laptops, tablets, and smartphones, today announced the results of the 2013 Mobile Enterprise Risk Survey.  The survey polled workers in companies with 1000 or more employees who use mobile phones for work within diverse industries, including banking, retail, healthcare, and energy. The poll focused on the state of bring-your-own-device (BYOD) policies within these organizations and the current sentiment of workers regarding responsibility and compliance for corporate data contained on mobile devices.

Key US findings of the 2013 Mobile Enterprise Risk Survey include:

  • It's not my problem
    When asked about appropriate penalties if they leak or lose company data, a quarter (25.2 percent) of American enterprise workers surveyed said there should be no punishment since data security is not their responsibility.
  • It's not a big deal
    While 75 percent of respondents felt that they should face some penalty if they lost corporate data, many of those who had lost a device with work data on it said their punishment ranged from 'nothing' (34 percent) to simply having to replace the device (30 percent) or getting a 'talking to', but nothing else (21 percent).
  • I didn't know
    About one quarter (23 percent) of respondents indicated that they do not know their company's procedure for dealing with work device loss or theft. Also, 10 percent of respondents indicated that their employer is not looking to introduce a procedure for the loss or theft of work devices.
  • It can't happen to me again
    More than one third (35 percent) of respondents who had lost their mobile phones stated that they did not change their security habits afterwards.
  • It's just a phone
    Nearly two thirds (59 percent) of enterprise mobile users estimated their corporate data to be worth less than $500.

As the use of mobile devices continues to increase in the enterprise, these survey results indicate IT is still facing many challenges implementing and enforcing mobile-use guidelines. Although employees may feel the data on their device is only worth $500, when you consider that most data breach penalties can range into the millions of dollars, there's an obvious disconnect between an employee's perception and the risk to the organization.

"If firms don't set clear policies that reflect the priority of corporate data security, they can't expect employees to make it a priority on their own," said Tim Williams, mobile enterprise data expert and Director, Product Management at Absolute Software.

The lax attitude of workers towards securing mobile devices and the data they contain, even after device loss or theft, places enterprises and their sensitive data in a vulnerable position.

"The data may be carried around in the employee's pocket, but the half million dollar fines we've seen levied due to data loss come out of the company's pocket," said Williams. "Clear policies, properly articulated to employees, will ensure that the entire company, not just IT, unites against mobile data loss."

For a complete report on the findings of Absolute Software's Mobile Enterprise Risk Survey, please visit: http://www.absolute.com/en/resources/research/mobile-enterprise-risk-us

About Absolute Software
Absolute Software Corporation (TSX: ABT) is the industry standard in persistent endpoint security and management for computers, laptops, tablets and smartphones. The Company, a leader in device security and management tracking for 20 years, has over 30,000 commercial customers worldwide. Absolute's solutions - Computrace®, Absolute Manage®, Absolute Service, Absolute Secure Drive, and Absolute LoJack® - provide organizations with actionable intelligence to prove compliance, securely manage BYOD, and deliver comprehensive visibility and control over all of their devices and data. Absolute is positioned on two Gartner, Inc. Magic Quadrants - the Magic Quadrant for Client Management Tools and the Magic Quadrant for Mobile Device Management Software. Absolute is one of only four vendors to be recognized on both Magic Quadrants based on providing customers with the ability to secure and manage many different types of devices using a single solution. Absolute persistence technology is embedded in the firmware of computers, netbooks, tablets and smartphones by global leaders, including Acer, ASUS, Dell, Fujitsu, HP, Lenovo, Motion, Panasonic, Samsung, and Toshiba, and the Company has reselling partnerships with these OEMs and others, including Apple. For more information about Absolute Software, visit www.absolute.com.

Methodology
From November 15 to 29, 2013, Vision Critical conducted an online survey among 750 randomly selected US adults age 18+ who have a mobile phone for work, and work for a company with 1000 employees or more.

This press release contains forward-looking statements that involve risks and uncertainties. These forward-looking statements relate to, among other things, the expected performance, functionality and availability of our services and products, and other expectations, intentions and plans contained in this press release that are not historical fact. When used in this press release, the words "plan," "expect," "believe," and similar expressions generally identify forward-looking statements. These statements reflect our current expectations. They are subject to a number of risks and uncertainties, including, but not limited to, changes in technology and general market conditions. In light of the many risks and uncertainties you should understand that we cannot assure you that the forward-looking statements contained in this press release will be realized. Furthermore, the forward-looking statements contained in this press release are made as at the date hereof and the Company does not undertake any obligation to update publicly or to revise any of the included forward-looking statements, whether as a result of new information, future events or otherwise, except as may be required by applicable securities laws.

©2014 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software Corporation. LoJack is a registered trademark of LoJack Corporation, used under license by Absolute Software Corporation. LoJack Corporation is not responsible for any content herein. U.S. patents No. 5,715,174, No. 5,764,892, No. 5,802,280, No. 5,896,497, No. 6,087,937, No. 6,244,758, No. 6,269,392, No. 6,300,863, No. 6,507,914, No. 7,818,557, No. 7,818,803, No. 7,945,709, No. 8,062,380, No. 8,234,359, No. 8,241,369, No. 8,307,055, No. 8,332,953, No. 8,346,234, No. 8,362,901, No. 8,418,226, No. 8,419,806, No. 8,441,348, No. 8,510,825, No. 8,556,991, No. 8,566,961 and No. 8,606,971. Canadian patents No. 2,211,735, No. 2,284,806, No. 2,205,370, No. 2,771,208 and No. 2,733,222. U.K. patents No. EP0793823, No. GB2298302, and No. GB2338101. German patent No. 69512534. Australian patent No. 699045. Japanese patents No. 4067035, No. 5220924 and No. 5363305. Mexican patents No. 297,406 and No. 306,287. Russian patent No. 2,460,220. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.

SOURCE Absolute Software Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
SYS-CON Events announced today that SkyScale will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. SkyScale is a world-class provider of cloud-based, ultra-fast multi-GPU hardware platforms for lease to customers desiring the fastest performance available as a service anywhere in the world. SkyScale builds, configures, and manages dedicated systems strategically located in maximum-security...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, will examine the regulations and provide insight on how it affects technology, challenges the established rules and will usher in new levels of diligence a...
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but tedious when swapping in and swapping out occurs in disarray and thrashing takes place. The resolution for thrashing through machine learning algorithms and support nomenclature is through simple techniques. Organizations that have been collecting large customer data are increasingly seeing the need to use the data for swapping in and out and thrashing occurs ...