Study Reveals Opportunity for IT to Protect Mobile Wireless Users

A global third-party study commissioned by Cisco and the National Cyber Security Alliance reveals behavioral findings among mobile wireless workers that spotlight the human side of security as businesses and IT organizations empower more and more employees to remain connected outside of their offices.

Conducted this spring by InsightExpress, an independent market research firm, the study explores what's at stake for businesses striving to become mobile, and therefore more agile and efficient. It reveals findings gleaned from more than 700 mobile employees in seven countries that have adopted wireless technologies widely: the United States, United Kingdom, Germany, China, India, South Korea, and Singapore. Although the study uncovers risky behavioral trends, the results represent a major opportunity for IT to play a more proactive and strategic role in protecting their employees and businesses overall, both through education and solutions.

This is especially relevant as adoption of wireless and mobility technologies increases. For example, IDC reports that by 2009 the number of mobile workers in the United States is expected to reach more than 70 percent of the country's total workforce. Korn/Ferry International reports that 81 percent of executives globally are constantly connected via mobile devices.

"Wireless and mobility technologies are here to stay. They're a fact of life," said Ron Teixeira, executive director of NCSA, an organization chartered to educate the public on online security and safety. "While this study shows mobility provides businesses with new risks, so do other Internet services and new technologies. Mobility and the Internet can be used securely and safely if businesses institute a culture of security within their workforce by providing their employees with continuous cyber security awareness and education programs."

Almost three fourths (73 percent) of mobile users claimed that they are not always cognizant of security threats and best practices when working on the go. Although many said they are aware "sometimes," 28 percent of them admitted that they "hardly ever" consider security risks and proper behavior. Some of these mobile users even admitted that they "never" consider safe best practices and didn't know they needed to be aware of security risks. When asked why they were lax in their security behavior, many mobile users offered reasons like, "I'm in a hurry," "I'm busy and need to get work done," "Security just is not top-of-mind for me," and "It's IT's job, not mine."

According to Ben Gibson, director of Cisco's wireless and mobility solutions, this reasoning highlights the importance for IT to engage users and educate them on good security behavior. A good security culture drives good security behavior, he says.

"Businesses are increasingly entrusting more and more employees with access to corporate information anywhere outside of the office, and this doesn't need to be a growing concern -- not if the proper security technology and IT-user engagement model is in place," Gibson said. "After all, embracing mobility and truly leveraging the power it gives businesses -- agility, access, responsiveness, efficiency -- requires protecting and educating employees to prevent them from undermining this value. This is a role IT can and should play more proactively than they traditionally have in the past."

Mobile employees admitted to engaging in a variety of risky behavior. A couple examples include:

• Accessing unauthorized wireless connections

Whether it's hijacking a neighbor's wireless connection or jumping
onto unauthorized connections in public places, one-third of mobile users
engage in this behavior. China (54 percent) featured the most extreme
cases. This behavior was also prevalent in Germany (46 percent) and South
Korea (44 percent). Top Reasons: "I can't tell whose connection I'm using"; "Mine isn't
working"; "They don't know so it's OK"; "I don't want to pay for my own
connection."

• Opening emails and attachments from unknown or suspicious sources

Almost half (44 percent) of all mobile users surveyed said they open
emails and/or attachments from unknown or suspicious sources. In China,
India, and the United Kingdom, more than half of mobile end users admitted
to this behavior. A significant number (76 percent) said it is more
difficult to identify suspicious emails and files on PDAs and smartphones
than on laptops because the screens are much smaller.

"What's key is knowing that the issues outlined in this study can be addressed," said Jeff Platon, Cisco's vice president of security solutions. "Technology is important in helping to resolve security issues for wireless mobile users, but education and communication are proactive measures IT can take to help address corporate security and generate greater ROI on their investments. IT should be a strategic asset to the business -- enabling business process transformation and unlocking the power of collaboration. As more workers become mobile, proactively educating them to practice good security behavior should be a key tenet of any business' approach to IT security and risk management."

According to Teixeira, best practices that IT can work with mobile employees on include:

• Use effective passwords that are changed every 90 days
• Update antivirus and anti-spyware programs
• Download necessary patches to operating systems regularly
• Create backups of all important data and files
• Encrypt sensitive data
• Have an emergency response plan for wireless security breaches
• Marry proactive education with proper technology that protects
connections to networks, mobile and wireless devices as they leave
corporate environments, and re-entry of those devices into the same
corporate environments as they reconnect to their networks. This includes a
defense-in-depth wireless (and wired) security infrastructure that
incorporates virtual private networking, device and endpoint protection,
intrusion detection, admission control, effective management, etc.

Featured

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.