infographic: mobile at work

1

Click here to load reader

Upload: blueboxer2014

Post on 08-Jun-2015

167 views

Category:

Mobile


0 download

DESCRIPTION

90% of employees use their personal smartphones at work, 35% use tablets in the office and 40% use two or more personal devices. Is your data secure?

TRANSCRIPT

Page 1: Infographic: Mobile At Work

MOBILE AT WORKWHAT YOU DON’T KNOW CAN HURT YOU.

7.1 BILLIONMOBILE SUBSCRIPTIONS WORLDWIDE.

90% 35%

40%OF EMPLOYEES USE PERSONAL SMARTPHONES AT WORK

USE PERSONALTABLETS AT THE OFFICE

USE TWO OR MOREPERSONAL DEVICES

62%43%

WHAT APPS ARE EMPLOYEES USING?It isn’t just about email anymore.

Email 76%

67%

48%

41%

39%

29%

SMS

IM/Chat

Social Networks

Word Processing

Line of Business Apps

Microblogging

Team Document Sharing Sites

23%

21%

Source: Forrsights Workforce Employee Survey, Q42013Forrester Research

NUMBER OF APPSIT THINKS EMPLOYEESARE USING FOR WORK:3 vs.

1/3 OF EMPLOYERS FALSELYBELIEVE THAT:

“NONE of our employees areusing unapproved apps!”

of companies have experienceda mobile data loss within the past12 months; 11% of them were requiredto disclose the loss publicly.

EMPLOYEE REALITY:

217X AS MANY

AS ESTIMATED

Mobile is the new enterprise desktop.

BYOD POLICIESare important...

...but often ignored.

64%40%

33%

45%

RANK MOBILE SECURITYA TOP PRIORITY FOR 2014

HAVE A CORPORATEBYOD POLICY IN PLACE

OF EMPLOYEES HAVE NO IDEA WHATTHEIR COMPANY’S BYOD POLICY IS.

? ? ?

THE GREAT DIVIDEEmployees IT Staff

Until companies put employee concerns on par with security concerns, employees will continue to work around IT and introduce risk to the enterprise.

InformationWeek,2013 Mobile Security Survey December, 2013

Source: “Managing Applications in the Age of BYOA:Reclaiming IT's Strategic Role" by LogmeIn Inc and Edge Strategies in 2014

65%76%place employee

concernswell below

securityconsiderations

are concernedabout privacywhen usingpersonaldevices at work

www.bluebox.com

APPS

Mobile Security Trends in the Workplace Data courtesy of Bluebox Security, Inc.©2014 Bluebox Security