Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementAccess Management

Research Shows Gap Between Perception and Reality of Mobile Vulnerabilities

July 27, 2016

Despite extensive resources dedicated to mobile security, many IT decision-makers remain concerned about the level of vulnerabilities that persist, according to new research conducted by BlackBerry Limited.

The survey reveals that 73 percent of organizations have a mobile security strategy in place, but only three percent say they have implemented the highest levels of security possible. This is in part because of user attitudes – 82 percent of the executives admit mobile security precautions cause at least some frustration among employees, and potentially hinder productivity. Overall, 44 percent fear that too much mobile security will prevent employees from doing their job.

This fear of implementing a stronger mobile environment led to a startling majority, 86 percent, of executives who said they are worried about the level of protection for their organization with half saying they will experience more security breaches through mobile devices. Part of the reason organizations are opening themselves up to these risks is because of the growing trend of BYOD – where despite the popularity, almost half believe that supporting a BYOD policy is a risk. A critical element to a successful BYOD or COPE (corporate owned, personally enabled) mobile environment is ensuring the isolation and separation of personal and business mobile data, also known as containerization. However, nearly 45 percent have no containerization technology in place.

“The frequency and severity of malicious attacks have made mobile security the center of attention for CEOs and boards of directors, but doing enough to mitigate risk is still a persistent problem that needs to be solved. This is especially true as the constant adoption of new technologies regularly brings the potential for new vulnerabilities, which can offset the benefits,” said David Kleidermacher, Chief Security Officer at BlackBerry. “We have also heard many of our customers say that security policies can be perceived as a hindrance. However, senior executives in every function, and even in the boardroom, need to forcefully communicate that effective mobile security enhances productivity instead of obstructing it.”

The research also uncovered that nearly half of organizations do not have a Security Incident Response Team (SIRT) in place, despite the fact that SIRT is an industry best practice to reduce the cost of data breaches. IT decision-makers also want and seek outside help when it comes to securing their mobile environments. Of those surveyed, 59 percent report that external expertise is the best option for reviewing mobile practices.

The numbers are just as pronounced and even more so when analyzing specific industries:

Only around four in ten respondents’ organizations have a mobile device management strategy in place. Of these respondents, many felt their organization’s mobile device security strategy is not good enough, specifically:

  • Financial services: 44 percent
  • Government: 52 percent
  • Healthcare: 37 percent
  • Legal: 54 percent

Overall, 47 percent believe that popular BYOD policies leave the company vulnerable to too many risks, and those concerns are reflected in different sectors:

  • Financial services: 55 percent
  • Healthcare: 50 percent
  • Government: 43 percent
  • Legal: 53 percent

Seventy-three percent see mobile security controls as either an “obstruction” or a “complete obstruction,” and the problems are even worse in some industries:

  • Financial services: 78 percent
  • Healthcare: 78 percent
  • Government: 85 percent
  • Legal: 94 percent

However, there is general agreement that a strong mobile security posture can offer great benefits:

  • 67 percent say their data is more secure
  • 64 percent see increased mobility for employees
  • 51 percent have experienced fewer security breaches
  • 50 percent find it easier to comply with regulations

Enhanced compliance is a benefit for financial services (55 percent), healthcare (54 percent) and IT/computer services (65 percent)

“All mobile security policies must be consistently evaluated and tweaked, but also regularly overhauled,” added Kleidermacher. 

http://press.blackberry.com/en/press/2016/mobile-security-research-uncovers-gap-between-perception-and-reality-of-vulnerabilities.html 

KEYWORDS: Bring Your Own Device (BYOD) mobile devices mobile security security strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Cisco Annual Security Report Reveals Widening Gulf Between Perception and Reality of Cybersecurity Readiness

    See More
  • school safety and security report

    State of School Safety report reveals 30% gap between parents and administrators on perception of school safety

    See More
  • open laptop on desk

    Research found 53% gap between best and worst email security solutions

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing