Welcome!

News Feed Item

Mobile Security Research Uncovers Gap Between Perception and Reality of Vulnerabilities

- 86 percent of executives still worry about potential hacks

NEW YORK, NEW YORK -- (Marketwired) -- 07/19/16 -- BLACKBERRY SECURITY SUMMIT - A new global research initiative conducted by BlackBerry Limited (NASDAQ:BBRY)(TSX:BB), a global leader in secure mobile communications, finds that despite extensive resources dedicated to mobile security, many IT decision-makers remain concerned about the level of vulnerabilities that persist. The study surveyed 1,000 executives from seven countries across a wide range of vertical industries, including financial services, government and healthcare.

The survey reveals that 73 percent of organizations have a mobile security strategy in place, but only three percent say they have implemented the highest levels of security possible. This is in part because of user attitudes - 82 percent of the executives admit mobile security precautions cause at least some frustration among employees, and potentially hinder productivity. Overall, 44 percent fear that too much mobile security will prevent employees from doing their job.

This fear of implementing a stronger mobile environment led to a startling majority, 86 percent, of executives who said they are worried about the level of protection for their organization with half saying they will experience more security breaches through mobile devices. Part of the reason organizations are opening themselves up to these risks is because of the growing trend of BYOD - where despite the popularity, almost half believe that supporting a BYOD policy is a risk. A critical element to a successful BYOD or COPE (corporate owned, personally enabled) mobile environment is ensuring the isolation and separation of personal and business mobile data, also known as containerization. However, nearly 45 percent have no containerization technology in place.

"The frequency and severity of malicious attacks have made mobile security the center of attention for CEOs and boards of directors, but doing enough to mitigate risk is still a persistent problem that needs to be solved. This is especially true as the constant adoption of new technologies regularly brings the potential for new vulnerabilities, which can offset the benefits," said David Kleidermacher, Chief Security Officer at BlackBerry. "We have also heard many of our customers say that security policies can be perceived as a hindrance. However, senior executives in every function, and even in the boardroom, need to forcefully communicate that effective mobile security enhances productivity instead of obstructing it."

The research also uncovered that nearly half of organizations do not have a Security Incident Response Team (SIRT) in place, despite the fact that SIRT is an industry best practice to reduce the cost of data breaches. IT decision-makers also want and seek outside help when it comes to securing their mobile environments. Of those surveyed, 59 percent report that external expertise is the best option for reviewing mobile practices.

The numbers are just as pronounced and even more so when analyzing specific industries:

--  Only around four in ten respondents' organizations have a mobile device
    management strategy in place. Of these respondents, many felt their
    organization's mobile device security strategy is not good enough,
    specifically: 
    --  Financial services: 44 percent 
    --  Government: 52 percent 
    --  Healthcare: 37 percent 
    --  Legal: 54 percent
--  Overall, 47 percent believe that popular BYOD policies leave the company
    vulnerable to too many risks, and those concerns are reflected in
    different sectors: 
    --  Financial services: 55 percent 
    --  Healthcare: 50 percent 
    --  Government: 43 percent 
    --  Legal: 53 percent
--  Seventy-three percent see mobile security controls as either an
    "obstruction" or a "complete obstruction," and the problems are even
    worse in some industries:  
    --  Financial services: 78 percent  
    --  Healthcare: 78 percent 
    --  Government: 85 percent 
    --  Legal: 94 percent 

However, there is general agreement that a strong mobile security posture can offer great benefits:

--  67 percent say their data is more secure 
--  64 percent see increased mobility for employees 
--  51 percent have experienced fewer security breaches 
--  50 percent find it easier to comply with regulations 
--  Enhanced compliance is a benefit for financial services (55 percent),
    healthcare (54 percent) and IT/computer services (65 percent)

"All mobile security policies must be consistently evaluated and tweaked, but also regularly overhauled," added Kleidermacher. "BlackBerry recognizes that security is a dynamic field, and even the best defensive strategies and technologies today may be inadequate tomorrow. Therefore, the optimal strategy is one that secures the mobile enterprise while boosting convenience and productivity, and can then be adapted to combat new vulnerabilities as they arise. BlackBerry continues to integrate key capabilities into its enterprise software portfolio to provide organizations the flexibility they need as they use mobility to empower IT decision makers and employees."

BlackBerry was the first mobile technology company to develop a comprehensive SIRT program and is now offering incident response management services and best practices assessment to help businesses implement important risk management functions rapidly and cost effectively. For information about BlackBerry's professional security services go to http://us.blackberry.com/enterprise/professional-services.html.

For more information on BlackBerry's enterprise software portfolio, visit www.blackberry.com/enterprise.

To follow the news at the annual BlackBerry Security Summit today, use #BBSecurity and read more at www.InsideBlackBerry.com.

Methodology

The survey was conducted in April and May of 2016 by Vanson Bourne and commissioned by BlackBerry. It interviewed 1,000 IT decision makers across the United States, United Kingdom, France, Germany, India, Singapore and Australia. Industries analyzed in this survey include financial services, legal, healthcare government, IT/computer services, manufacturing and more. All organizations have between 100 and 1,000 employees.

About BlackBerry

BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world's most sensitive data across all end points - from cars to smartphones - making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols "BB" on the Toronto Stock Exchange and "BBRY" on the NASDAQ. For more information, visit www.BlackBerry.com.

BlackBerry and related trademarks, names and logos are the property of BlackBerry Limited and are registered and/or used in the U.S. and countries around the world. All other marks are the property of their respective owners. BlackBerry is not responsible for any third-party products or services.

Contacts:
Media Contact:
BlackBerry Media Relations
(519) 597-7273
[email protected]

Investor Contact:
BlackBerry Investor Relations
(519) 888-7465
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
"We focus on SAP workloads because they are among the most powerful but somewhat challenging workloads out there to take into public cloud," explained Swen Conrad, CEO of Ocean9, Inc., in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
The vast majority of businesses now use cloud services, yet many still struggle with realizing the full potential of their IT investments. In particular, small and medium-sized businesses (SMBs) lack the internal IT staff and expertise to fully move to and manage workloads in public cloud environments. Speaker Todd Schwartz will help session attendees better navigate the complex cloud market and maximize their technical investments. The SkyKick co-founder and co-CEO will share the biggest challe...
Machine learning provides predictive models which a business can apply in countless ways to better understand its customers and operations. Since machine learning was first developed with flat, tabular data in mind, it is still not widely understood: when does it make sense to use graph databases and machine learning in combination? This talk tackles the question from two ends: classifying predictive analytics methods and assessing graph database attributes. It also examines the ongoing lifecycl...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
Sanjeev Sharma Joins November 11-13, 2018 @DevOpsSummit at @CloudEXPO New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...