This statistic shows the results of a survey asking companies what policies or procedures they had in place to limit the risks with regards to information security from the use of mobile computing in 2012. 52 percent of respondents said they had adjusted their policies.
Which of the following controls have you implemented to mitigate the new or increased risks related to the use of mobile computing (e.g., tablet computers)?
Characteristic
Percentage of repondents
Policy adjustments
52%
Increased security awareness activities
40%
Encryption techniques
40%
New mobile device management software
36%
Allow company tablets and smartphones but disallow personal devices
34%
Governance process to manage the use of mobile applications
31%
Architectural changes
24%
Adjusted incident management processes
15%
Attack and penetration testing of mobile applications
14%
Increased auditing capability
12%
New disciplinary processes
9%
Disallow the use of all tablets and smartphones for professional use
CIOs, CISOs, CFOs, CEOs and other information security executives
Method of interview
Face-to-face interview, online survey
Supplementary notes
* Ernst & Young received feedback from nearly 1,836 CIOs, CISOs, CFOs, CEOs and other information security executives from 64 countries and across all industry sectors.
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
EY. (November 23, 2012). Which of the following controls have you implemented to mitigate the new or increased risks related to the use of mobile computing (e.g., tablet computers)? [Graph]. In Statista. Retrieved November 22, 2024, from https://www.statista.com/statistics/205864/controls-to-mitigate-risks-of-mobile-computing-in-organizations/
EY. "Which of the following controls have you implemented to mitigate the new or increased risks related to the use of mobile computing (e.g., tablet computers)?." Chart. November 23, 2012. Statista. Accessed November 22, 2024. https://www.statista.com/statistics/205864/controls-to-mitigate-risks-of-mobile-computing-in-organizations/
EY. (2012). Which of the following controls have you implemented to mitigate the new or increased risks related to the use of mobile computing (e.g., tablet computers)?. Statista. Statista Inc.. Accessed: November 22, 2024. https://www.statista.com/statistics/205864/controls-to-mitigate-risks-of-mobile-computing-in-organizations/
EY. "Which of The following Controls Have You Implemented to Mitigate The New or Increased Risks Related to The Use of Mobile Computing (E.G., Tablet Computers)?." Statista, Statista Inc., 23 Nov 2012, https://www.statista.com/statistics/205864/controls-to-mitigate-risks-of-mobile-computing-in-organizations/
EY, Which of the following controls have you implemented to mitigate the new or increased risks related to the use of mobile computing (e.g., tablet computers)? Statista, https://www.statista.com/statistics/205864/controls-to-mitigate-risks-of-mobile-computing-in-organizations/ (last visited November 22, 2024)
Which of the following controls have you implemented to mitigate the new or increased risks related to the use of mobile computing (e.g., tablet computers)? [Graph], EY, November 23, 2012. [Online]. Available: https://www.statista.com/statistics/205864/controls-to-mitigate-risks-of-mobile-computing-in-organizations/