Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/20/2015
02:16 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Security Study: Consumers Fearful Of Mobile Shopping

29 Percent of Consumers Do Not Know When Personal Information Has Been Accessed Without Consent, According to Study from Blancco Technology Group

Atlanta, GA & London, UK, November 19, 2015 – Blancco Technology Group, a leading, global provider of data erasure solutions and mobile device diagnostics, today released its new data security study, Risky Mobile Business. The in-depth study, which surveyed over 1,400 mobile users across four different countries, reveals that inadequate security precautions taken by mobile users not only put their personal information at risk, but also leave corporate data exposed and susceptible to cyber theft.

Despite consumers and legislative authorities demanding more data management responsibility and accountability from companies, close to one-third (29 percent) of the surveyed consumers admit they do not know when their personal information has been accessed without their consent. According to Paul Henry, IT Security Consultant for Blancco Technology Group, “There is no excuse for not knowing what is happening with your data – be it personal information on a user’s smartphone or tablet, or company files and intellectual property on those same mobile devices.” 

The study also shines a spotlight on the dilemma businesses face of building products, services and customer experiences that are highly personalized and relevant across all channels, while simultaneously protecting customer data from being accessed by cyber thieves. One-third of the surveyed consumers (33 percent) say they are somewhat confident, but don’t feel safe shopping from their mobile devices. Another 23 percent are hesitant to link their credit cards to mobile apps. With the holiday shopping season fast approaching, this ongoing battle between personalization and privacy will be a major roadblock in driving sales, not to mention boosting adoption of retail shopping apps and sharing economy services like Uber and Airbnb. 

According to Pat Clawson, CEO, Blancco Technology Group, “The study’s findings point to a larger mindset shift that needs to take place. Both individuals and businesses cannot simply confine their understanding of security to the scope of devices or IT assets. Instead, they need to approach it from the perspective of information management across the entire lifecycle – from the moment information is created to when it’s transferred to where it’s stored, and finally, to how it’s removed permanently (not just ‘deleted’).”

Additional key findings from the report include:

·        While mobile users acknowledge the importance of security, they don’t take the right precautions. 25 percent of consumers mistakenly believe that deleting sensitive files/folders and locking devices with a passcode are effective and trustworthy ways to protect their personal data. In stark contrast, only 5 percent believe installing software to permanently erase data will safeguard their privacy.

·        Cyber security isn’t handled with the same level of concern as physical security. When asked to confirm the very first action users would take if their mobile device is lost or stolen, only 4 percent would report theft to the police. Meanwhile, 21 percent would rather disable the device through their mobile carrier and buy a replacement, and 19 percent would use GPS to locate their device.

·        Tangible proof of data removal is key to adoption of data wiping software. Receiving a tamper-proof certificate displaying all data that’s been erased from mobile devices would 100 percent affect the purchase decision of 35 percent of consumers.

The study surveyed over 1,400 consumers in the United States, Canada, UK and Australia and was fielded from June 5, 2015 through June 11, 2015. The responses are comprised of consumers, aged 25-65 years old, who own at least one mobile device (smartphone or tablet).

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24028
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
CVE-2021-29370
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.