+ All Categories
Home > Technology > Survey Results: The consumerization of it from the end user’s perspective

Survey Results: The consumerization of it from the end user’s perspective

Date post: 18-Nov-2014
Category:
Upload: symantec
View: 1,902 times
Download: 0 times
Share this document with a friend
Description:
More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.
16
Survey Results: The Consumerization of IT from the End User’s Perspective
Transcript
Page 1: Survey Results: The consumerization of it from the end user’s perspective

Survey Results:The Consumerization of IT from the End User’s Perspective

Page 2: Survey Results: The consumerization of it from the end user’s perspective

Methodology

• Survey conducted via MarketTools, Inc.

• 154 respondents

• Respondents recruited through social media channels

• Only respondents using a smartphone in connection with employment counted

2

Page 3: Survey Results: The consumerization of it from the end user’s perspective

Key Findings

• End users don’t comprehend the security risks

• The consumerization of IT is already a reality for most organizations

• Most organizations not effectively communicating policies and/or best practices

• Policies and/or best practices primarily deal with the loss or theft of devices, with malware still taking a backseat

3

Page 4: Survey Results: The consumerization of it from the end user’s perspective

Key Findings

• Employees are using smartphones to access sensitive and confidential information

• End users don’t fully realize the potentially sensitive nature of the information stored on smartphones

• Smartphones rank high on end users’ must-have technology lists

• Despite being tech savvy smartphone users, some people just shouldn’t be parents

4

Page 5: Survey Results: The consumerization of it from the end user’s perspective

End users realize the productivity and satisfaction benefits of allowing employees to use the smartphones of their choice for work, but don’t fully comprehend the extent of the security challenges this creates.

5% 6%

18%

33%

38%

0%

5%

10%

15%

20%

25%

30%

35%

40%

Significantly decreases

productivity

Somewhat decreases

productivity

No impact on

productivity

Somewhat increases

productivity

Significantly increases

productivity

1%6% 7%

37%

48%

0%

10%

20%

30%

40%

50%

60%

Significantly decreases

satisfaction

Somewhat decreases

satisfaction

No impact on

satisfaction

Somewhat increases

satisfaction

Significantly increases

satisfaction

16%

52%

23%

4% 5%

0%

10%

20%

30%

40%

50%

60%

Significantly decreases

overall security

Somewhat decreases

overall security

No impact on overall security

Somewhat increases

overall security

Significantly increases

overall security

5

Page 6: Survey Results: The consumerization of it from the end user’s perspective

The consumerization of IT has already become a reality for most organizations.

Yes63%

Yes, but only within a set list of smartphone options

25%

No12%

Does your company allow employees to use the smartphones of their choice for work-related activities?

My employer provided it to me44%

My employer provided me with a stipend and I purchased it

14%

I purchased it with my own funds43%

How did you obtain your work-related smartphone?

6

Page 7: Survey Results: The consumerization of it from the end user’s perspective

Despite most organizations allowing employees to use their work-related smartphones for personal use, they are still struggling to effectively communicate mobile device policies and/or best practices.

Yes91%

No9%

Does your company allow employees to use their work-related smartphones for personal use?

Yes51%

No49%

Has your employer communicated any policies and/or best practices to you regarding the security of your work-related smartphone?

7

Page 8: Survey Results: The consumerization of it from the end user’s perspective

The mobile device security policies and/or best practices that are being communicated primarily deal with the loss or theft of devices, with malicious apps still taking a backseat.

88%

42%

62%

65%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Guidelines for password protecting access to my smartphone

Guidelines for downloading apps to my smartphone

Guidelines for using security software (i.e. antivirus, remote device lock, remote device wipe) on my smartphone

Guidelines for which smartphones are allowed to connect to company resources based on platform (i.e. BlackBerry, Android, iOS,

Windows)

Which of the following security-related policies and/or best practices has your employer communicated to you regarding your work-related smartphone? (Please

select all that apply)

8

Page 9: Survey Results: The consumerization of it from the end user’s perspective

Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done.

Yes58%

No42%

Are you aware of any mobile device security and/or management software or tools your company uses in connection with your work-related smartphone?

Yes73%

No27%

Do you use your work-related smartphone to access information that could be considered sensitive or confidential?

9

Page 10: Survey Results: The consumerization of it from the end user’s perspective

Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done.

40%

22%

67%

73%

0% 10% 20% 30% 40% 50% 60% 70% 80%

Financial data

Employee records

Personally identifiable information

Competitive/proprietary information

What types of information do you access on your phone that could be considered sensitive or confidential? (Please select all that apply)

10

Page 11: Survey Results: The consumerization of it from the end user’s perspective

End users don’t fully realize the potentially sensitive nature of the information stored on smartphones.

27%

13%

52%

8%

24%

39%

17%

20%

27%

35%

20%

18%

21%

13% 11%

54%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Laptop Smartphone Wallet Car keys

Please rank the following items based on the emotional distress each one would cause you if lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4

being the item that would cause the least emotional distress.

4

3

2

1

11

Page 12: Survey Results: The consumerization of it from the end user’s perspective

Smartphones rank high on end users’ must-have technology lists.

82%

35%

49%

24%

43%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90%

MP3 Player

TV

DVR

Laptop

Tablet computer

Which of the following would you give up before giving up of your smartphone? (Please select all that apply)

12

Page 13: Survey Results: The consumerization of it from the end user’s perspective

Despite being tech savvy smartphone users, some people just shouldn’t be parents.

1%

29%

0% 5% 10% 15% 20% 25% 30% 35%

Firstborn child

Favorite food for a year

Which of the following would you give up before giving up of your smartphone? (Please select all that apply)

13

Page 14: Survey Results: The consumerization of it from the end user’s perspective

Symantec Recommendations

14

Page 15: Survey Results: The consumerization of it from the end user’s perspective

Recommendations

• Encrypt the data on mobile devices

• Use security software on your smartphone

• Develop and enforce strong security policies for using mobile devices

• Make sure all software is up-to-date

• Avoid opening unexpected text messages from unknown senders

• Click with caution when engaging in mobile social networking

• Users should be aware of their surroundings when accessing sensitive information

• Focus on protecting information as opposed to focusing on the devices

• Know what to do if a device is lost or stolen

• Mobile management is key

15

Page 16: Survey Results: The consumerization of it from the end user’s perspective

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Thank you!

For more information, please visit http://bit.ly/jHvrgN.

16


Recommended