Security is the main concern for business smartphone deployment

HMD research also finds the majority of large companies use outdated devices

Smartphones now come equiped with fingerprint scanners

Security is the main priority for businesses when considering which supplier to partner with to provide mobile devices for their workforce - despite the majority using devices that are outdated.

The vast majority of devices in the smartphone fleet are at least two years old - according to research commissioned by Nokia manufacturer HMD Global - calling into doubt whether companies are receiving the latest security patches despite considering this a major priority.

Advertisement - Article continues below

According to the 2018 Business Smartphone Purchase Survey for Western Europe', small businesses are more likely to deploy newer phones than their larger counterparts - 42% versus 34% - while 64% of large businesses use devices that have aged at least two years.

Manufacturers which provide frequent security patches are the most trusted, meanwhile, followed by those who can offer guaranteed mobile OS upgrades, according to the 2018 Business Smartphone Purchase Survey for Western Europe'.

The survey of 500 purchasers for businesses across Western Europe, including 100 in the UK, also showed businesses prioritise a broad range of devices, and affordability, over exclusive and high-end smartphones. Moreover, brand identity, and the absence of bloatware, are also considered - but not as highly as security.

Although 95% of businesses agree regular and fast security patches are an important factor in any purchaser's decision, the quality of the antivirus software installed on the device also matters, with less than two percent refusing to accept the need for malware defence.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Meanwhile 93% of businesses agree the need for a form of mobile threat detection, such as Android devices' built-in malware protection system Google Play Protect.

Biometric features, such as fingerprint readers, are the least in-demand - with just 59% of businesses finding this alternative to the password important of very important. It is perhaps surprising given major companies such as Microsoft have come out strongly against the password as a secure login method.

"IT security is becoming increasingly important," said HMD Global's vice president for Western Europe Jon French.

"Cyber defense on smartphones begins when you make your purchase decision. Regular and fast security patches, OS upgrades, and the absence of unnecessary bloatware make mobile devices more resilient against hacker attacks."

Interestingly the use of enterprise mobility management (EMM) systems, central platforms for mobile devices that enable IT managers to monitor usage and access them remotely, is sparse, with only 64% of large businesses and 48% of small businesses deploying one.

Advertisement - Article continues below

Only a quarter of businesses, 25%, considered EMM as a very important security tool - significantly lower than those that considered security patches, 34%, antivirus software, 34%, and mobile threat detection, 33%, very important.

"IT security and mobile security need to be taken seriously to avoid data breachesand downtimes," the research concluded.

"IT security can easily be improved, but unfortunately how to do it - such as obtaining regular security patches for smartphones - is often neglected."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/28026/what-is-a-ddos-attack
Security

What is a DDoS attack?

8 Jul 2020
Visit/strategy/29089/six-benefits-of-hot-desking
Business strategy

The benefits of hot desking

28 May 2020
Visit/business-strategy/31780/the-it-pro-panel
Business strategy

The IT Pro Panel

25 May 2020
Visit/machine-learning/31708/what-are-the-pros-and-cons-of-ai
machine learning

What are the pros and cons of AI?

21 Apr 2020

Most Popular

Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/server-storage/servers/356083/the-best-server-solution-for-your-smb
Sponsored

The best server solution for your SMB

26 Jun 2020