Key Finding: Using personal devices at work has
become common and there is an expectation to have a
similar experience across all devices.
Key Finding: More than half of end users report that
they have the ability to connect seamlessly to their
corporate network from any location and at any time.
Key Finding: The belief that “IT will support me if something
goes wrong” is the top reason for end users engaging in bolder
Internet use on company-issued devices.
63%
58%
60%
Cisco Connected World
International Mobile Security Study
Organizations across the globe are looking for the best way to provide workers with secure “anytime, anywhere, any
device” network access. To help IT administrators and the businesses they serve better understand the attitudes and
experiences of mobile users in the enterprise with special attention to security, we conducted a survey of more than
4600 end users across 10 countries.
90% of end users say it is important to
have similar access and experience on
both company and personal devices.
Over half of the end users said company devices should be for
both work and play.
50% have remote access but cite
frustration such as access to information
is restricted.
60% when remote they borrow someone else’s
wireless connection at least sometimes.
(Of note: 50% from India report borrowing
other’s connection all the time.)
download sensitive corporate data on their
personal device at least “sometimes.”
in India download data more frequently,
reporting “all the time.”
(Rationale: “needed the information wherever
I go—whether it’s secure or not.”)
engage in some form of risky technology
behavior on a device for work activities.
Read the white paper for more research highlights and considerations for Enterprise IT.
Learn more about how Cisco Secure Access Solution can help connect users and devices securely.
High ExpectationsHigh Expectations
Risk Behavior?Risk Behavior?
Data ProtectionData Protection
Blurred LinesBlurred Lines
Not-So-Seamless AccessNot-So-Seamless AccessRemote WorkingRemote Working
1 in 3 experience malicious downloads on their device
(company or personal).
consider it a privilege, though most end users in China and
India believe it is a right.
A privilege or right?
1 in 4 say they take more risk with company-issued devices.
%53

More Related Content

PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PDF
Clear and Present Danger
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
Managing Mobile Business Insecurities
PDF
Guide Preview: Ensuring your enterprise image-viewer if fully secure
PDF
Android security a survey of issues, malware penetration, and defenses
PDF
New trends in Payments Security: NFC & Mobile
Top Seven Risks of Enterprise Mobility - How to protect your business
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Clear and Present Danger
Mobile Security: The 5 Questions Modern Organizations Are Asking
Managing Mobile Business Insecurities
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Android security a survey of issues, malware penetration, and defenses
New trends in Payments Security: NFC & Mobile

What's hot (20)

PDF
10 things you should know about cybersecurity
PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PDF
Context based access control systems for mobile devices
PPTX
Artificial Intelligence and Cybersecurity
PDF
The good, the bad, and the ugly on integration ai with cybersecurity
PPTX
10 Things to Watch for in 2016
PPTX
10 IT Security Trends to Watch for in 2016
PPTX
Use of Artificial Intelligence in Cyber Security - Avantika University
PPTX
Cyber Security in AI (Artificial Intelligence)
PDF
Spe security and privacy enhancement framework for mobile devices
PDF
Combating Cyber Security Using Artificial Intelligence
PDF
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
PPTX
First line of defense for cybersecurity : AI
PPTX
Manjula security for startups
PDF
Secure your Future with IoT Security Testing | Application Security
PPT
Footprintig(Haching)
PDF
Artificial Intelligence for Cyber Security
PDF
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PDF
Cyber Defense Automation
10 things you should know about cybersecurity
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Context based access control systems for mobile devices
Artificial Intelligence and Cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
10 Things to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Use of Artificial Intelligence in Cyber Security - Avantika University
Cyber Security in AI (Artificial Intelligence)
Spe security and privacy enhancement framework for mobile devices
Combating Cyber Security Using Artificial Intelligence
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
First line of defense for cybersecurity : AI
Manjula security for startups
Secure your Future with IoT Security Testing | Application Security
Footprintig(Haching)
Artificial Intelligence for Cyber Security
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Cyber Defense Automation
Ad

Viewers also liked (11)

PDF
Dell software - Бэкап на автопилоте. Новый взгляд на оптимизацию резервного к...
PPTX
Veeam Availability Suite v8: Стратегия защиты данных в современных ЦОД ,особ...
PDF
[Short 11-30] Артем Гончар - Европейский опыт в защите персональных данных
PPTX
Technical means of data protection технические средства зашиты информации
PDF
Symantec Endpoint Protection_Конкурс продуктов портала VirtualizationSecurity...
PDF
A Reality Check on the State of Cybersecurity
PDF
Pervasive Security Across Your Extended Network
PDF
The Evolution of and Need for Secure Network Access
PDF
Cisco ISE Reduces the Attack Surface by Controlling Access
PDF
Infographic: Security for Mobile Service Providers
PDF
Integrated Network Security Strategies
Dell software - Бэкап на автопилоте. Новый взгляд на оптимизацию резервного к...
Veeam Availability Suite v8: Стратегия защиты данных в современных ЦОД ,особ...
[Short 11-30] Артем Гончар - Европейский опыт в защите персональных данных
Technical means of data protection технические средства зашиты информации
Symantec Endpoint Protection_Конкурс продуктов портала VirtualizationSecurity...
A Reality Check on the State of Cybersecurity
Pervasive Security Across Your Extended Network
The Evolution of and Need for Secure Network Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Infographic: Security for Mobile Service Providers
Integrated Network Security Strategies
Ad

Similar to Infographic: Mobile Security Research (20)

PDF
INSECURE Magazine - 42
PDF
Enterprise Edge Security with Cisco ISE
PDF
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
PDF
B Distributed Workforce Management In The Cloud Wp.En Us
PDF
5 Ways to Stay #CyberSecure
PDF
top-6-reasons-to-protect-your-documents-ebook.pdf
PDF
The Future of BYOD, BYOA and Consumerization
PPTX
T.A.S.C - mobile device secuirty
PDF
Enhancing Cybersecurity in Remote Work-3.pdf
DOCX
Protecting Intellectual Property in the Age of WikiLeaks
PPTX
iPads on your network? Take Control with Unified Policy and Management
PDF
PulseSecure_Report_HybridIT_120715
PDF
PulseSecure_Report_HybridIT_120715
PDF
4192 sslvpn sb_0412
PDF
AST-0002415_MobileSecurity-CIO
PDF
AST-0002415_MobileSecurity-CIO
PPTX
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
PDF
Data Security and MPS
DOCX
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
PPT
Version 3.6 Powerpoint March10
INSECURE Magazine - 42
Enterprise Edge Security with Cisco ISE
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
B Distributed Workforce Management In The Cloud Wp.En Us
5 Ways to Stay #CyberSecure
top-6-reasons-to-protect-your-documents-ebook.pdf
The Future of BYOD, BYOA and Consumerization
T.A.S.C - mobile device secuirty
Enhancing Cybersecurity in Remote Work-3.pdf
Protecting Intellectual Property in the Age of WikiLeaks
iPads on your network? Take Control with Unified Policy and Management
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
4192 sslvpn sb_0412
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Data Security and MPS
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Version 3.6 Powerpoint March10

More from Cisco Security (20)

PDF
Incident Response Services Template - Cisco Security
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PPTX
Cisco Web and Email Security Overview
PPTX
Cisco 2015 Midyear Security Report Slide Deck
PDF
3 Tips for Choosing a Next Generation Firewall
PDF
AMP Helps Cisco IT Catch 50% More Malware threats
PDF
Balance Data Center Security and Performance
PDF
The Cost of Inactivity: Malware Infographic
PDF
Data Center Security Challenges
PPTX
Enterprise Strategy Group: Security Survey
PDF
Malware and the Cost of Inactivity
PDF
Midsize Business Solutions: Cybersecurity
PDF
Cisco Addresses the Full Attack Continuum
PDF
Infonetics Network and Content Security Vendor Scorecard
PDF
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
PDF
Cisco 2014 Midyear Security Report
PDF
String of Paerls Infographic
PDF
Midyear Security Report Infographic
PDF
Cisco Annual Security Report Infographic
PDF
City of Tomorrow Builds in Next-Generation Security
Incident Response Services Template - Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Web and Email Security Overview
Cisco 2015 Midyear Security Report Slide Deck
3 Tips for Choosing a Next Generation Firewall
AMP Helps Cisco IT Catch 50% More Malware threats
Balance Data Center Security and Performance
The Cost of Inactivity: Malware Infographic
Data Center Security Challenges
Enterprise Strategy Group: Security Survey
Malware and the Cost of Inactivity
Midsize Business Solutions: Cybersecurity
Cisco Addresses the Full Attack Continuum
Infonetics Network and Content Security Vendor Scorecard
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco 2014 Midyear Security Report
String of Paerls Infographic
Midyear Security Report Infographic
Cisco Annual Security Report Infographic
City of Tomorrow Builds in Next-Generation Security

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
The various Industrial Revolutions .pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Modernising the Digital Integration Hub
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Architecture types and enterprise applications.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
STKI Israel Market Study 2025 version august
PPTX
Build Your First AI Agent with UiPath.pptx
What is a Computer? Input Devices /output devices
1 - Historical Antecedents, Social Consideration.pdf
Module 1.ppt Iot fundamentals and Architecture
sustainability-14-14877-v2.pddhzftheheeeee
Benefits of Physical activity for teenagers.pptx
Getting started with AI Agents and Multi-Agent Systems
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
The various Industrial Revolutions .pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
Modernising the Digital Integration Hub
2018-HIPAA-Renewal-Training for executives
Improvisation in detection of pomegranate leaf disease using transfer learni...
Final SEM Unit 1 for mit wpu at pune .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Architecture types and enterprise applications.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Enhancing plagiarism detection using data pre-processing and machine learning...
STKI Israel Market Study 2025 version august
Build Your First AI Agent with UiPath.pptx

Infographic: Mobile Security Research

  • 1. Key Finding: Using personal devices at work has become common and there is an expectation to have a similar experience across all devices. Key Finding: More than half of end users report that they have the ability to connect seamlessly to their corporate network from any location and at any time. Key Finding: The belief that “IT will support me if something goes wrong” is the top reason for end users engaging in bolder Internet use on company-issued devices. 63% 58% 60% Cisco Connected World International Mobile Security Study Organizations across the globe are looking for the best way to provide workers with secure “anytime, anywhere, any device” network access. To help IT administrators and the businesses they serve better understand the attitudes and experiences of mobile users in the enterprise with special attention to security, we conducted a survey of more than 4600 end users across 10 countries. 90% of end users say it is important to have similar access and experience on both company and personal devices. Over half of the end users said company devices should be for both work and play. 50% have remote access but cite frustration such as access to information is restricted. 60% when remote they borrow someone else’s wireless connection at least sometimes. (Of note: 50% from India report borrowing other’s connection all the time.) download sensitive corporate data on their personal device at least “sometimes.” in India download data more frequently, reporting “all the time.” (Rationale: “needed the information wherever I go—whether it’s secure or not.”) engage in some form of risky technology behavior on a device for work activities. Read the white paper for more research highlights and considerations for Enterprise IT. Learn more about how Cisco Secure Access Solution can help connect users and devices securely. High ExpectationsHigh Expectations Risk Behavior?Risk Behavior? Data ProtectionData Protection Blurred LinesBlurred Lines Not-So-Seamless AccessNot-So-Seamless AccessRemote WorkingRemote Working 1 in 3 experience malicious downloads on their device (company or personal). consider it a privilege, though most end users in China and India believe it is a right. A privilege or right? 1 in 4 say they take more risk with company-issued devices. %53