Security is the main concern for business smartphone deployment

HMD research also finds the majority of large companies use outdated devices

Smartphones now come equiped with fingerprint scanners

Security is the main priority for businesses when considering which supplier to partner with to provide mobile devices for their workforce - despite the majority using devices that are outdated.

The vast majority of devices in the smartphone fleet are at least two years old - according to research commissioned by Nokia manufacturer HMD Global - calling into doubt whether companies are receiving the latest security patches despite considering this a major priority.

Advertisement - Article continues below

According to the 2018 Business Smartphone Purchase Survey for Western Europe', small businesses are more likely to deploy newer phones than their larger counterparts - 42% versus 34% - while 64% of large businesses use devices that have aged at least two years.

Manufacturers which provide frequent security patches are the most trusted, meanwhile, followed by those who can offer guaranteed mobile OS upgrades, according to the 2018 Business Smartphone Purchase Survey for Western Europe'.

The survey of 500 purchasers for businesses across Western Europe, including 100 in the UK, also showed businesses prioritise a broad range of devices, and affordability, over exclusive and high-end smartphones. Moreover, brand identity, and the absence of bloatware, are also considered - but not as highly as security.

Although 95% of businesses agree regular and fast security patches are an important factor in any purchaser's decision, the quality of the antivirus software installed on the device also matters, with less than two percent refusing to accept the need for malware defence.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Meanwhile 93% of businesses agree the need for a form of mobile threat detection, such as Android devices' built-in malware protection system Google Play Protect.

Biometric features, such as fingerprint readers, are the least in-demand - with just 59% of businesses finding this alternative to the password important of very important. It is perhaps surprising given major companies such as Microsoft have come out strongly against the password as a secure login method.

"IT security is becoming increasingly important," said HMD Global's vice president for Western Europe Jon French.

"Cyber defense on smartphones begins when you make your purchase decision. Regular and fast security patches, OS upgrades, and the absence of unnecessary bloatware make mobile devices more resilient against hacker attacks."

Interestingly the use of enterprise mobility management (EMM) systems, central platforms for mobile devices that enable IT managers to monitor usage and access them remotely, is sparse, with only 64% of large businesses and 48% of small businesses deploying one.

Advertisement - Article continues below

Only a quarter of businesses, 25%, considered EMM as a very important security tool - significantly lower than those that considered security patches, 34%, antivirus software, 34%, and mobile threat detection, 33%, very important.

"IT security and mobile security need to be taken seriously to avoid data breachesand downtimes," the research concluded.

"IT security can easily be improved, but unfortunately how to do it - such as obtaining regular security patches for smartphones - is often neglected."

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/business-strategy/31780/the-it-pro-panel
Business strategy

The IT Pro Panel

24 Feb 2020
Visit/technology/30736/what-is-ethical-ai
Technology

What is ethical AI?

11 Feb 2020
Visit/careers/28212/a-guide-to-cyber-security-certification-and-training
Careers & training

A guide to cyber security certification and training

13 Jan 2020
Visit/ir35/introduction
Software

Hotmail.co.uk migration to Outlook.com: Qs answered

11 Nov 2019

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/security/data-breaches/355173/marriott-hit-by-data-breach-exposing-personal-data-of-52-million
data breaches

Marriott data breach exposes personal data of 5.2 million guests

31 Mar 2020
Visit/security/cyber-crime/355171/fbi-warns-of-zoom-bombing-hackers-amidst-coronavirus-usage-spike
cyber crime

FBI warns of ‘Zoom-bombing’ hackers amid coronavirus usage spike

31 Mar 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020