Welcome!

Symbian Authors: Jack Newton, Kevin Benedict, Matthew Lobas, Shelly Palmer, RealWire News Distribution

News Feed Item

Mobile Network Providers Face a Potential Exodus of 74 Percent of Smartphone Users After a Security Breach

Survey reveals that hacked and insecure smartphones may trigger massive churn among disgruntled customers

BOXBOROUGH, Mass., Dec. 3, 2012 /PRNewswire/ -- Crossbeam Systems, Inc., the leading provider of next-generation security platforms for high-performance networks, today released research revealing that compromised security – more than high monthly fees – would be the biggest catalyst for triggering users to change mobile network providers.

(Photo: http://photos.prnewswire.com/prnh/20121203/NE21819-INFO )

(Logo: http://photos.prnewswire.com/prnh/20120330/NE79533LOGO )

An independent survey of smartphone users in the U.S., United Kingdom and Germany was conducted by market research firm Opinion Matters on behalf of Crossbeam. More than 1,000 adult smartphone users were polled in each country to examine usage habits, the importance of mobile security and data services, purchasing considerations, and what would motivate them to switch providers.

According to the survey, 63 percent of global respondents cite high monthly fees as the primary issue that would drive them away from their current mobile network provider, with only five percent citing a lack of security. However, if survey respondents' smartphones were to be compromised by hackers, malware or other security failures, 55 percent would consider changing providers and 19 percent would definitely change providers – leading to a potential exodus of 74 percent of customers.

This finding challenges network providers' conventional thinking about their investment priorities, with most aggressively focusing on building ever faster high-speed network infrastructure and attractive data plans, but less on shoring up their security infrastructure and offering value-added security services and protection to end users and their devices.

"Smartphone users, like most people, don't think about the security of their devices until they've been hacked. This may be misleading mobile network operators to focus less of their attention on customer security and underestimate the risk it creates," said Peter Doggart, senior director of global marketing at Crossbeam. "There is an inadequate level of investment in security compared to other areas of the mobile network. This is a wake-up call for service providers, especially as we're reaching a critical mass of smartphone users worldwide, not to mention the growth of data-enabled endpoints connecting to mobile phone networks, including smartphones, tablets, e-book readers and more. The quantity of threats directed at mobile devices and their level of sophistication are on the rise."

Mobile network providers will be blamed for smartphone attacks, regardless of fault
According to survey results, 56 percent of global respondents don't know if their mobile network provider has measures in place to secure their smartphone. Despite this uncertainty, 42 percent of U.S. and 38 percent of U.K. smartphone users would still blame their network provider if their device or service were to be hacked, while 22 percent and 18 percent, respectively, would blame their smartphone manufacturer.

German smartphone users are much less likely to blame their network provider; almost half (45%) say they would blame themselves before their provider (21%), yet they would be just as likely to leave their provider as their U.S. and U.K. counterparts following a security breach. This is despite the fact that 47 percent of German respondents claim to have security countermeasures (i.e., antivirus software, firewalls, etc.) installed on their smartphones – significantly higher than both the U.S. (35%) and the U.K. (26%). Mobile network providers will ultimately still be held responsible by their customers after a hack.

"The results indicate that mobile network providers will be blamed, regardless of who's at fault," added Doggart. "This more than anything reveals an important opportunity for providers to be proactive about securing their networks in order to gain customers and minimize churn. As smartphone attacks become more prevalent, the service providers who anticipated the increased need for security and took the time to prepare will be in the best competitive position."

The good news: smartphone users are willing to pay extra for security
Despite the majority of smartphone users' concern with high fees, 53 percent of global respondents expressed a willingness to pay their network provider additional fees to help improve security. Regionally, 59 percent of U.S. and 65 percent of German respondents would be willing to pay extra for security services, although almost two-thirds of U.K. respondents (63%) were against any type of additional fee.

Loss of personal information tops list of smartphone users' concerns
The survey also found that in the event of a smartphone security breach, access to personal information such as credit card numbers and passwords worried most (60%) users. More than 42 percent worried about losing their stored contacts, and almost half (45%) were worried about access to their private media (i.e., photos, videos, text messages, etc.).

An encouraging sign for security awareness, 43 percent of respondents were cognizant that their smartphone contained applications that stored or had access to sensitive financial information.

For more information and to download the full survey report, please visit http://www.crossbeam.com/opinion-matters-reg/.

For more information on how Crossbeam's X-Series platform is securing mobile operator networks, please visit: http://www.crossbeam.com/solutions/securing-the-mobile-network/.

About Crossbeam
Crossbeam Systems®, Inc. offers a proven approach to deploying network security that meets the extreme performance, scalability and reliability demands of large enterprises, service providers and government agencies. Its leading X-Series security platform offers an open, high-performance architecture that easily provisions and scales multiple best-in-class security applications to meet the ever-changing threat landscape. Companies rely on Crossbeam to intelligently manage risk, accelerate and maintain compliance, and protect their businesses from evolving threats. Crossbeam is headquartered in Boxborough, Mass., and has offices in Europe, Latin America and Asia Pacific. More information is available at www.crossbeam.com.

Crossbeam Systems and Crossbeam are registered trademarks of Crossbeam Systems, Inc. All other company, product or service names not owned by Crossbeam mentioned in this press release are the property of their respective owners.

Contact: Sharon Dratch
Davies Murphy Group
(781) 418-2425
[email protected]

SOURCE Crossbeam Systems, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profession...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
UAS, drones or unmanned aircraft, no matter what you call them — this was their week. Our news stream was flooded with updates on the newly announced rules and regulations for commercial UAS from the FAA. So, naturally we have dedicated this week’s top news round up to highlight some of our favorite UAS stories.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.