The Breakdown
Here are the report’s highlights, segmented by industry:Enterprise- 23% of respondents suffered a mobile security compromise. Of those, 74% said the impact of the mobile security compromise was major and 34% said it had lasting repercussions.
- 81% of organizations said their mobile device security spend increased over the past year and 76% believe it will increase over the coming year as well.
- 88% of businesses worry that a mobile security breach could have a lasting impact on their brand or customer loyalty.
- 70% said that increased mobile use is essential to staying relevant to consumers, while 41% said this presented a daunting security challenge.
- 93% of executives believe cybercriminals see their sector as a more lucrative target than other industries.
- 87% of healthcare organizations worry that the highly confidential nature of patient data makes them a target for cybercriminals.
- 85% are concerned that a security breach could compromise patient care.
- 76% of organizations agree that the adoption of telehealth presents healthcare providers with a great opportunity to improve patient care.
- 79% believe a mobile security compromise could disrupt their entire supply chain, resulting in serious financial implications.
- 76% of organizations agree that the adoption of mobile-based services by shop floor workers is essential to improving productivity.
- 87% said that employee expectations for remote/flexible working is forcing them to re-evaluate how they operate. Another 72% of respondents agreed that the increased use of mobile-based services by public sector employees is essential to accelerating the digital transformation of public services.
Downtime is Money Lost
Sampath Sowmyanarayan, chief executive, Verizon Business, put the findings into perspective:“For businesses – regardless of industry, size, or location on a map – downtime is money lost. Compromised data is trust lost, and those moments, although not insurmountable, are tough to rebound from. Companies need to dedicate time and budget on their security architecture, especially when it comes to off-premise devices. Otherwise, they are leaving themselves vulnerable to cyberthreat actors.”