Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Mobile Security
Real-time info services with Neustar
Average Rating:
Rate this article:  
Bill for Lost Cell Phones was $30 Billion in 2011, Study Finds
Bill for Lost Cell Phones was $30 Billion in 2011, Study Finds

By Jennifer LeClaire
March 23, 2012 12:36PM

Bookmark and Share
Based on more than 15 million users, Lookout's analysis found that demographics and behavior are the largest factors influencing phone loss. Over the course of 2011, Lookout located 9 million lost smartphones, which equals one phone every 3.5 seconds. In total, Lookout found that U.S. consumers lose their phone about once a year.
 


Have you ever lost a cell phone? You are not alone. In 2011, U.S. consumers lost more than $30 billion worth of cell phones, according to mobile security provider Lookout.

Lookout just released the findings of its first-ever phone loss study. And the results are disturbing for enterprises concerned about mobile security. Lost phones, if unrecovered, could cost U.S. consumers more than $30 billion in 2012.

"Each day, $7 million worth of phones are lost by Lookout users alone, and if unrecovered, it would take a significant toll not only on our wallets, but on our psyche too," said Kevin Mahaffey, co-founder and CTO Lookout. "Safeguarding your smartphone starts with protecting it from the number one risk you face -- losing it."

Mobile Device Management?

Based on more than 15 million users, Lookout's analysis found that demographics and behavior are the largest factors influencing phone loss. Over the course of 2011, Lookout located 9 million lost smartphones, which equals one phone every 3.5 seconds. In total, Lookout found that U.S. consumers lose their phone about once a year. If unrecovered, that could cost every smartphone owner more than $250 a year each.

"The concept of Mobile Device Management is inherently flawed. I am not controlling the device. What I need to do is put a container out there that's encrypted, stuff everything in it and if it gets lost make sure there are no authentication credentials in it that can penetrate the container. Erase the container and it all goes," said Michael Disabato, managing vice president of network and telecom at Gartner.

"If it's a BYOD all you are touching is the container and you get rid of all the enterprise information leaving the employee's information alone. If the phone gets stolen, you can then do a device reset and erase everything and give employees some peace of mind that everything is gone. So the whole concept is managing the data and it doesn't matter who owns the device."

3 Billion More Mobile Devices Coming

Infonetics forecasts that more than 3 billion new mobile devices -- smartphones and tablets -- will ship between 2011 and 2015, and these devices are truly changing the way people work, and blurring the lines between personal and corporate assets.

"A new wave of mobile devices are being connected to corporate networks, like it or not, and many companies are embracing BYOD (bring your own device) strategies to decrease capital cost and increase productivity," says Jeff Wilson, principal analyst for security atInfonetics Research.

"The enterprise mobile device security market is poised to explode for one simple reason: all over the world, employees are replacing desktops and laptops with smartphones and tablets, and IT departments are scrambling to connect those devices and then protect them. Success selling security solutions in this space is really about two things: allowing an IT department to connect all the devices they want or need to connect, and providing a consistent level of security policy and enforcement for all those devices."
 

Tell Us What You Think
Comment:

Name:

enhompe:

Posted: 2012-03-26 @ 12:56pm PT
Why aren't the carriers themselves helping victims recover their phones?



Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.


 Mobile Security
1.   Google Expands Virus Scans to All Apps
2.   Samsung Adding Anti-Theft Solutions
3.   Police Keep Quiet About Cell Tracking
4.   BlackBerry Wins Security Certification
5.   NSA Collects, Retrieves Foreign Calls


advertisement
Google Expands Virus Scans to All Apps
Not limited to Google Play apps anymore.
Average Rating:
Police Keep Quiet About Cell Tracking
Tool called Stingray remains a mystery.
Average Rating:
BlackBerry Wins Security Certification
Enterprise Service 10 gets FIPS nod.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.