SlideShare a Scribd company logo
Survey Results:
The Consumerization of IT
from the End User’s Perspective
Methodology
• Survey conducted via MarketTools, Inc.
• 154 respondents
• Respondents recruited through social media channels
• Only respondents using a smartphone in connection with
  employment counted




                                                           2
Key Findings
• End users don’t comprehend the security risks
• The consumerization of IT is already a reality for most
  organizations
• Most organizations not effectively communicating policies
  and/or best practices
• Policies and/or best practices primarily deal with the loss or
  theft of devices, with malware still taking a backseat




                                                                   3
Key Findings
• Employees are using smartphones to access sensitive and
  confidential information
• End users don’t fully realize the potentially sensitive nature of
  the information stored on smartphones
• Smartphones rank high on end users’ must-have technology
  lists
• Despite being tech savvy smartphone users, some people just
  shouldn’t be parents




                                                                      4
End users realize the productivity and satisfaction
benefits of allowing employees to use the smartphones
of their choice for work, but don’t fully comprehend
the extent of the security challenges this creates.
40%                                                          38%                60%
35%                                             33%                                                                                            48%
                                                                                50%
30%                                                                                                                              37%
25%                                                                             40%
20%                                18%                                          30%
15%                                                                             20%
10%       5%           6%                                                                                            7%
                                                                                10%                     6%
 5%                                                                                        1%
 0%                                                                               0%
      Significantly Somewhat No impact Somewhat Significantly                          Significantly Somewhat No impact Somewhat Significantly
       decreases decreases          on        increases    increases                    decreases decreases           on       increases    increases
      productivity productivity productivity productivity productivity                 satisfaction satisfaction satisfaction satisfaction satisfaction


                                         60%                    52%
                                         50%
                                         40%
                                         30%                                23%
                                         20%       16%

                                         10%                                              4%          5%
                                          0%
                                                Significantly Somewhat    No impact    Somewhat Significantly
                                                 decreases decreases      on overall    increases increases
                                                   overall      overall    security       overall   overall
                                                  security     security                  security  security

                                                                                                                                                          5
The consumerization of IT has already become a reality
for most organizations.
    Does your company allow employees to use the smartphones of their choice for work-related
                                          activities?


                                                                No
                                                               12%
      Yes, but only within a set list of
            smartphone options
                    25%
                                                                                        Yes
                                                                                        63%




                                 How did you obtain your work-related smartphone?



                                           I purchased it with my own My employer provided it to
                                                     funds                      me
                                                      43%                      44%




                                                                                       My employer provided me with a
                                                                                          stipend and I purchased it
                                                                                                    14%
                                                                                                                        6
Despite most organizations allowing employees to use
their work-related smartphones for personal use, they
are still struggling to effectively communicate mobile
device policies and/or best practices.
        Does your company allow employees to use their work-related smartphones for personal use?

                                                   No
                                                   9%




                                                        Yes
                                                        91%




Has your employer communicated any policies and/or best practices to you regarding the security of your work-
                                          related smartphone?



                                         No
                                        49%                         Yes
                                                                    51%




                                                                                                            7
The mobile device security policies and/or best
practices that are being communicated primarily deal
with the loss or theft of devices, with malicious apps
still taking a backseat.
               Which of the following security-related policies and/or best practices has your
              employer communicated to you regarding your work-related smartphone? (Please
                                            select all that apply)
                                                                           0%   10%   20%   30%   40%    50%   60%    70%   80%   90% 100%



        Guidelines for password protecting access to my smartphone                                                                 88%




                  Guidelines for downloading apps to my smartphone                                      42%




   Guidelines for using security software (i.e. antivirus, remote device
             lock, remote device wipe) on my smartphone
                                                                                                                     62%



     Guidelines for which smartphones are allowed to connect to
  company resources based on platform (i.e. BlackBerry, Android, iOS,                                                 65%
                             Windows)




                                                                                                                                             8
Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
    Do you use your work-related smartphone to access information that could be considered sensitive
                                          or confidential?

                                                No
                                               27%

                                                        Yes
                                                        73%




 Are you aware of any mobile device security and/or management software or tools your company uses in
                            connection with your work-related smartphone?


                                             No
                                            42%

                                                           Yes
                                                           58%




                                                                                                        9
Employees are using smartphones to access sensitive
and confidential information, and while organizations
are improving in their efforts to ensure that these
devices are secure and properly managed, more needs
to be done.
                  What types of information do you access on your phone that could be
                   considered sensitive or confidential? (Please select all that apply)
                                             0%   10%   20%         30%   40%     50%   60%   70%     80%



                            Financial data                                  40%




                       Employee records                       22%




       Personally identifiable information                                                    67%




     Competitive/proprietary information                                                            73%




                                                                                                            10
End users don’t fully realize the potentially sensitive
 nature of the information stored on smartphones.
         Please rank the following items based on the emotional distress each one would cause you if
          lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4
                          being the item that would cause the least emotional distress.
100%

                                  13%                        11%
90%     21%

80%                                                          20%
                                                                                       54%
70%                               35%
        27%
60%                                                          17%
                                                                                                         4
50%                                                                                                      3
                                                                                                         2
40%     24%
                                                                                       18%               1
                                  39%
30%
                                                             52%
20%
                                                                                       20%
        27%
10%
                                  13%
                                                                                       8%
 0%
       Laptop                  Smartphone                   Wallet                   Car keys



                                                                                                         11
Smartphones rank high on end users’ must-have
technology lists.

                       Which of the following would you give up before giving up of your
                                  smartphone? (Please select all that apply)
                       0%      10%     20%     30%     40%         50%    60%   70%        80%         90%



         MP3 Player                                                                              82%




                 TV                                   35%




                DVR                                                 49%




             Laptop                          24%




     Tablet computer                                         43%




                                                                                                             12
Despite being tech savvy smartphone users, some
people just shouldn’t be parents.


                    Which of the following would you give up before giving
                    up of your smartphone? (Please select all that apply)
                                    0%        5%   10%   15%   20%   25%   30%    35%




                  Firstborn child        1%




         Favorite food for a year                                           29%




                                                                                        13
Symantec
Recommendations




                  14
Recommendations
• Encrypt the data on mobile devices
• Use security software on your smartphone
• Develop and enforce strong security policies for using mobile devices
• Make sure all software is up-to-date
• Avoid opening unexpected text messages from unknown senders
• Click with caution when engaging in mobile social networking
• Users should be aware of their surroundings when accessing sensitive
  information
• Focus on protecting information as opposed to focusing on the
  devices
• Know what to do if a device is lost or stolen
• Mobile management is key

                                                                          15
Thank you!
For more information, please visit http://bit.ly/jHvrgN.




Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        16

More Related Content

PDF
Improving Customer Experience
PDF
Privacy & Data Breach Management
PPTX
Promotional Products Industry Report
PDF
Symantec 2010 Critical Infrastructure Protection Study
PDF
Response summary [ skills perception survey ] - google docs
PDF
Power quality-asia
PDF
Sven ruyinx sustainability empowering the consumer to make informed decision
Improving Customer Experience
Privacy & Data Breach Management
Promotional Products Industry Report
Symantec 2010 Critical Infrastructure Protection Study
Response summary [ skills perception survey ] - google docs
Power quality-asia
Sven ruyinx sustainability empowering the consumer to make informed decision

What's hot (16)

PPTX
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
PPTX
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
PDF
2011 Social Recruiting Survey From Jobvite
PDF
Symantec 2011 Threat Management Survey Global Results
PDF
Delvinia Insights Boomers Vs N Gen
PDF
CCBA Pilot Results 2010
PDF
Michael Stoner - swissnexSF presentation
PDF
Asia Online? How Asian companies are missing the social media train
PDF
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
PDF
Accenture Consumer Electronics Products And Services Usage 09
PDF
Social media in Ireland Overview
PPTX
Insurance Sector ORBIT Report
PPTX
Raddon Chart of the Day June 19, 2012
PDF
China Online Retail Market - iResearch - Will Tao
PDF
Adobe: State of online advertising study Oct 24 2012
PDF
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
2012 B2B Social Media Marketing - Market Report by TheSocialPeople
2011 Social Recruiting Survey From Jobvite
Symantec 2011 Threat Management Survey Global Results
Delvinia Insights Boomers Vs N Gen
CCBA Pilot Results 2010
Michael Stoner - swissnexSF presentation
Asia Online? How Asian companies are missing the social media train
Web Performance: Who Cares About Customer Experience? - Daniel Schrijver (Ora...
Accenture Consumer Electronics Products And Services Usage 09
Social media in Ireland Overview
Insurance Sector ORBIT Report
Raddon Chart of the Day June 19, 2012
China Online Retail Market - iResearch - Will Tao
Adobe: State of online advertising study Oct 24 2012
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Ad

Viewers also liked (8)

PDF
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
PPTX
Accidental entrepreneur
PPTX
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
PDF
2012 State of Information Digital Information Index Information Sprawl Chapte...
PDF
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
PDF
2012 July Symantec Intelligence Report
PPTX
Security Trends to Watch in 2010 - A Mid-Year Status Check
PDF
Symantec 2010 Information Management Health Check
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
Accidental entrepreneur
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
2012 State of Information Digital Information Index Information Sprawl Chapte...
ESG Lab Validation Report: Achieving Best Practices for Virtual Machine Backu...
2012 July Symantec Intelligence Report
Security Trends to Watch in 2010 - A Mid-Year Status Check
Symantec 2010 Information Management Health Check
Ad

Similar to Survey Results: The consumerization of it from the end user’s perspective (20)

PPTX
Webinar on Mobility in Healthcare
PDF
Byod four steps to enabling your network michael greco
PPT
What's Your Business Grade?
PDF
2012 Connell & Partners Fall Pulse Survey Participant Report
PDF
Camerjam public sector masterclass incentivated
PPTX
SolarWinds UK and Germany SME Survey Results - Time and Budget
PPTX
Reference data2012 e-CRM survey
PDF
Patient-Provider Collaboration for Patient Safety
KEY
10 Social Media Thoughts for Integrated Marketing
PPTX
Symantec SMB File Sharing Flash Poll
PDF
The History of App Store
PPT
Mobile ecosystem
PDF
People; Process and Real-Time Data; the battle cry of the new and future tech...
PPSX
Managed mobility - SSDesign
PPTX
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
KEY
BIMA Presentation
PDF
UK enterprises' 2012 IT investment priorities
PPTX
Federal Employees Are Turning to Mobile Devices for Work
PPTX
Create Values from Big Data & Social Media Mash-Up
PDF
Mobile Media and TV
Webinar on Mobility in Healthcare
Byod four steps to enabling your network michael greco
What's Your Business Grade?
2012 Connell & Partners Fall Pulse Survey Participant Report
Camerjam public sector masterclass incentivated
SolarWinds UK and Germany SME Survey Results - Time and Budget
Reference data2012 e-CRM survey
Patient-Provider Collaboration for Patient Safety
10 Social Media Thoughts for Integrated Marketing
Symantec SMB File Sharing Flash Poll
The History of App Store
Mobile ecosystem
People; Process and Real-Time Data; the battle cry of the new and future tech...
Managed mobility - SSDesign
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
BIMA Presentation
UK enterprises' 2012 IT investment priorities
Federal Employees Are Turning to Mobile Devices for Work
Create Values from Big Data & Social Media Mash-Up
Mobile Media and TV

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
sap open course for s4hana steps from ECC to s4
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
sap open course for s4hana steps from ECC to s4
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Weekly Chronicles - August'25 Week I
Spectroscopy.pptx food analysis technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation

Survey Results: The consumerization of it from the end user’s perspective

  • 1. Survey Results: The Consumerization of IT from the End User’s Perspective
  • 2. Methodology • Survey conducted via MarketTools, Inc. • 154 respondents • Respondents recruited through social media channels • Only respondents using a smartphone in connection with employment counted 2
  • 3. Key Findings • End users don’t comprehend the security risks • The consumerization of IT is already a reality for most organizations • Most organizations not effectively communicating policies and/or best practices • Policies and/or best practices primarily deal with the loss or theft of devices, with malware still taking a backseat 3
  • 4. Key Findings • Employees are using smartphones to access sensitive and confidential information • End users don’t fully realize the potentially sensitive nature of the information stored on smartphones • Smartphones rank high on end users’ must-have technology lists • Despite being tech savvy smartphone users, some people just shouldn’t be parents 4
  • 5. End users realize the productivity and satisfaction benefits of allowing employees to use the smartphones of their choice for work, but don’t fully comprehend the extent of the security challenges this creates. 40% 38% 60% 35% 33% 48% 50% 30% 37% 25% 40% 20% 18% 30% 15% 20% 10% 5% 6% 7% 10% 6% 5% 1% 0% 0% Significantly Somewhat No impact Somewhat Significantly Significantly Somewhat No impact Somewhat Significantly decreases decreases on increases increases decreases decreases on increases increases productivity productivity productivity productivity productivity satisfaction satisfaction satisfaction satisfaction satisfaction 60% 52% 50% 40% 30% 23% 20% 16% 10% 4% 5% 0% Significantly Somewhat No impact Somewhat Significantly decreases decreases on overall increases increases overall overall security overall overall security security security security 5
  • 6. The consumerization of IT has already become a reality for most organizations. Does your company allow employees to use the smartphones of their choice for work-related activities? No 12% Yes, but only within a set list of smartphone options 25% Yes 63% How did you obtain your work-related smartphone? I purchased it with my own My employer provided it to funds me 43% 44% My employer provided me with a stipend and I purchased it 14% 6
  • 7. Despite most organizations allowing employees to use their work-related smartphones for personal use, they are still struggling to effectively communicate mobile device policies and/or best practices. Does your company allow employees to use their work-related smartphones for personal use? No 9% Yes 91% Has your employer communicated any policies and/or best practices to you regarding the security of your work- related smartphone? No 49% Yes 51% 7
  • 8. The mobile device security policies and/or best practices that are being communicated primarily deal with the loss or theft of devices, with malicious apps still taking a backseat. Which of the following security-related policies and/or best practices has your employer communicated to you regarding your work-related smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Guidelines for password protecting access to my smartphone 88% Guidelines for downloading apps to my smartphone 42% Guidelines for using security software (i.e. antivirus, remote device lock, remote device wipe) on my smartphone 62% Guidelines for which smartphones are allowed to connect to company resources based on platform (i.e. BlackBerry, Android, iOS, 65% Windows) 8
  • 9. Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done. Do you use your work-related smartphone to access information that could be considered sensitive or confidential? No 27% Yes 73% Are you aware of any mobile device security and/or management software or tools your company uses in connection with your work-related smartphone? No 42% Yes 58% 9
  • 10. Employees are using smartphones to access sensitive and confidential information, and while organizations are improving in their efforts to ensure that these devices are secure and properly managed, more needs to be done. What types of information do you access on your phone that could be considered sensitive or confidential? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% Financial data 40% Employee records 22% Personally identifiable information 67% Competitive/proprietary information 73% 10
  • 11. End users don’t fully realize the potentially sensitive nature of the information stored on smartphones. Please rank the following items based on the emotional distress each one would cause you if lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4 being the item that would cause the least emotional distress. 100% 13% 11% 90% 21% 80% 20% 54% 70% 35% 27% 60% 17% 4 50% 3 2 40% 24% 18% 1 39% 30% 52% 20% 20% 27% 10% 13% 8% 0% Laptop Smartphone Wallet Car keys 11
  • 12. Smartphones rank high on end users’ must-have technology lists. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% MP3 Player 82% TV 35% DVR 49% Laptop 24% Tablet computer 43% 12
  • 13. Despite being tech savvy smartphone users, some people just shouldn’t be parents. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 5% 10% 15% 20% 25% 30% 35% Firstborn child 1% Favorite food for a year 29% 13
  • 15. Recommendations • Encrypt the data on mobile devices • Use security software on your smartphone • Develop and enforce strong security policies for using mobile devices • Make sure all software is up-to-date • Avoid opening unexpected text messages from unknown senders • Click with caution when engaging in mobile social networking • Users should be aware of their surroundings when accessing sensitive information • Focus on protecting information as opposed to focusing on the devices • Know what to do if a device is lost or stolen • Mobile management is key 15
  • 16. Thank you! For more information, please visit http://bit.ly/jHvrgN. Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 16