+ All Categories
Home > Technology > Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

Date post: 14-Apr-2017
Category:
Upload: blancco
View: 522 times
Download: 2 times
Share this document with a friend
9
RISKY MOBILE BUSINESS
Transcript
Page 1: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

RISKY MOBILE BUSINESS

Page 2: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

11 % Solid State DrivesReasons Mobile Security Is Important & Cannot Be Ignored5

Let’s Take a Look at:

Page 3: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

11 % Solid State Drives

According to Cambridge

University Research:

As many as 630 million

Android devices might

not be capable of

completely wiping the

data saved in their

internal disks and SD

cards.

Page 4: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

#1: Failure to Regularly Monitor Mobile Data Is Risky Business

29% of mobile users worldwide don’t know when data was last accessed without their consent.

Page 5: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

#2: Financial Information and Photos/Videos Rank High on List of Vulnerable Data Types

52% of respondents are most fearful of financial information being accessed without their consent. Another 11% worry about

having their photos and videos compromised.

Page 6: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

#3: Although Mobile Enhances Customer Experiences, It Still Breeds Insecurities About

‘Safe’ Mobile Shopping

33% of respondents don’t feel safe shopping from

their mobile device.

Page 7: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

#4: While Mobile Users Acknowledge Importance of Mobile Security, They Don’t Take the Right

Precautions

25% believe ‘deleting’ files and locking devices with a passcode are effective in removing data. Plus, another 7%

of mobile users assume a factory reset is adequate.

Page 8: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

#5: Tangible Proof of Data Removal Is Key to Adoption of Data Wiping Software

Receiving a tamper-proof certificate displaying all data that’s been erased from mobile devices would 100 percent

affect the purchase decision of 35% of respondents.

Page 9: Risky Mobile Business - Study of Mobile User's Views on Data Privacy & Security

DOWNLOAD FULL STUDY LEARN ABOUT BLANCCO MOBILE ERASURE SOLUTION

CONCLUSION

“It’s the responsibility of the original user or owner to properly sanitize their equipment before it’s traded in, resold, donated or discarded. If individuals

simply rely on others to take care of protecting their data, that’s just irresponsible.”

“Similarly, if businesses take a lax approach or don’t monitor how, when and where all of the data from their equipment is removed before it’s discarded, reused or recycled and if they fail to obtain actual verification that all data

has been removed permanently, it’s just as irresponsible and can cause serious financial, legal and reputational damage.”

Paul Henry , IT Security Consultant , Blancco Technology Group


Recommended