Report by Forrester indicates that smartphone administrators want encryption, malware protection
The thought process surrounding PC and laptop security is quickly being integrated with strategies for protecting mobile and portable devices, according to a study published earlier this week.
"Managing and Securing Corporate and Personal Mobile Devices in Financial Services," a study conducted by Forrester Consulting on behalf of Fiberlink Communications Corp., collects feedback from financial services IT leaders on the top security priorities for personal mobile devices.
More than half of financial services enterprises already support personally owned mobile devices, according to the study.
More than one-third of the IT professionals indicated that their enterprise supports multiple mobile operating systems (OSs), with 10 percent supporting four or more. In an effort to avoid getting spread too thin, IT often provides minimal support for these OSs, introducing vulnerabilities and threats, the report says.
"As mobile operations increasingly converge, IT and telecom managers are realizing that they need to treat mobile devices the same as PCs," Forrester says.
"Based on this commissioned study from Forrester, it's clear to see that mobile device management and PC management are converging," said Jim Szafranski, senior vice president, customer platform services of Fiberlink. "Over 80 percent of firms are concerned about malware, hackers, and identity theft -- all issues previously associated with computers, not mobile devices. The research shows is that IT is now wisely beginning to manage smart phones in the same manner as PCs."
Eighty-six percent of respondents have already deployed a strong password policy for smartphones, the study says. Other popularly deployed strategies include full disk encryption (71 percent), remote lock/wipe (64 percent), and asset and activity visibility and management (66 percent) across all types of mobile devices.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024