Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

7/24/2012
08:51 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GFI Survey Finds 12% of Consumers Would Use Mobile Location-Based Tracking To Keep Tabs On Their Spouses

Location tracking also attractive to parents, with one in three saying they would use the feature to snoop on their teen’s whereabouts

Clearwater, Fla. – July 24, 2012 – GFI® Software today released new research showing that location-based services on mobile phones are highly sought after by consumers – and not just to find their lost devices. In a survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents say they would track where their teen goes on a Friday night. More than half (59%) also say they would use such a service to make sure their children were safe or in the location they are supposed to be.

The independent blind survey was conducted by Opinion Matters on behalf of GFI Software and gauged respondents’ opinions on mobile security and functionality, the value of personal data stored on their devices and children’s smartphone use.

Key highlights from the survey include:

· At least one quarter of consumers in both the 16 to 24 (29%) and 25 to 34 (25%) age groups use a smartphone or tablet as their primary means of accessing the Internet or checking email.

o This percentage sharply declines as the age groups increase – 14% for ages 35 to 44, 8% for ages 45-54 and 3% for consumers over the age of 55.

· Identity theft ranked only fourth among the key concerns respondents would have if their phone was lost or stolen. Consumers report that the hassle and cost of buying a new phone, replacing their contact lists and losing memorable photos are more significant concerns.

· 35% of consumers believe their personal data is easily replaceable or does not pose a security risk to them.

· One in three respondents believe that either their service carrier or their phone manufacturer is responsible for securing data stored on their smartphones.

“This research shows that younger generations are increasingly turning to mobile devices as their go-to-source for communicating and browsing the Web, yet there is still a profound lack of understanding among consumers of all ages about the value of the personal data stored on these devices, as well as confusion over who is responsible for securing them,” said Mark Patton, general manager, Security Business Unit at GFI Software. “For this reason, cybercriminals are increasingly targeting mobile devices, and it’s alarming to think about the number of people who aren’t leveraging the tools – literally at their fingertips, such as mobile antivirus – that can help protect personal data and prevent identity theft.”

From Risk to Reward

Children’s smartphone use is another grey area among consumers. Parents may be extremely vigilant in monitoring their children’s Internet use in the home, but with mobile devices, kids can now communicate with anyone and access the Internet from anywhere without parental supervision. As such, monitoring children’s smartphone use is now just as important as monitoring their activity on a PC or laptop. However, survey results reveal varying opinions when it comes to the age respondents think is critical for parents to begin doing so – under 10 (17%), 10-12 (18%), 12-14 (13%), 14-16 (6%), over 16 (2%). Additionally, 38% of respondents don’t think children should own a smartphone at all.

“While smartphones and tablets can present a number of risks if they aren’t adequately protected, they can also help parents improve their children’s safety in ways not previously possible,” continued Patton. “Parents can prevent unsolicited communications with activity monitoring, make sure their children are where they’re supposed to be with location tracking, and leverage a variety of other applications that enable them to keep their kids safe 24/7 – not just when they are by their side.”

The full results of the survey are available from GFI upon request.

The survey coincides with the launch of GFI VIPRE® Mobile Security Premium, one of the most comprehensive mobile protection applications for AndroidTM phones and tablets (see GFI VIPRE® Mobile Security Premium Now Available for Android™ Devices). Combining advanced antivirus technology with lost device, activity monitoring and online backup features, GFI VIPRE Mobile Security Premium enables Android users to use their devices freely without having to worry about mobile viruses, identity theft, data loss or unsupervised activity.

To learn more about GFI VIPRE Mobile Security Premium, visit www.vipremobile.com.

About GFI

GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized businesses (SMB) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States, UK, Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold ISV Partner.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Could you pass the hash, I really have to use the bathroom!
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9892
PUBLISHED: 2019-05-22
An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbit...
CVE-2019-10066
PUBLISHED: 2019-05-22
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6, Community Edition 6.0.x through 6.0.17, and OTRSAppointmentCalendar 5.0.x through 5.0.12. An attacker who is logged into OTRS as an agent with appropriate permissions may create a carefully crafted calendar appointment i...
CVE-2019-10067
PUBLISHED: 2019-05-22
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context...
CVE-2019-6513
PUBLISHED: 2019-05-21
An issue was discovered in WSO2 API Manager 2.6.0. It is possible for a logged-in user to upload, as API documentation, any type of file by changing the extension to an allowed one.
CVE-2019-12270
PUBLISHED: 2019-05-21
OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 configure excessive permissions by default on Windows. During installation, a displaylistcache file share is created on the Windows server with full read and write permissions for the Everyone group at both the NTFS and Share levels. The ...