Throughout this report, when we refer to companies, businesses or organizations, we include both public- and private-sector entities of all sizes. We use the term “enterprise” to refer to organizations with 500 or more employees and “small and medium-sized businesses” (SMBs) for those with fewer.
About this report
Mobile Security Index
Please provide the information below and then check your email for a link to view the online Verizon Mobile Security Index report.
You will soon receive an email with a link to confirm your access. When you click to confirm from your email, your document will be available for download.
If you do not receive an email within 2 hours, please check your spam folder.
You may now close this message and continue to your article.
Security terms like “attack” and “breach” are often used interchangeably. For clarity and precision, we have used the following definitions throughout this report:
A general term covering any deliberate action toward a system or data that is unauthorized. This may be as simple as attempting to access it without permission.
A successful attack that results in a system’s defenses being rendered ineffective. This could involve data loss, downtime, other systems being affected or no detrimental effects at all. It could be malicious or accidental.
- Data breach
An incident that results in the confirmed disclosure—not just potential exposure—of data to an unauthorized party.
A definition, often in the form of a script or code, of a method to successfully leverage one or more vulnerabilities to access a system without proper authorization.
This covers any form of security event, malicious or not, successful or not. This could be anything from a failed authentication attempt to a successful compromise and data breach. It includes non-malicious events such as the loss of a device.
A measure of the likelihood of a threat, an organization’s vulnerability to said event and the scale of the potential damage.
Any danger that could impact the security of systems or privacy of data. This can apply to a technique, such as phishing, or an actor, such as an organized criminal group.
A weakness that could be exploited. It may be known or unknown— to the manufacturer, developer, owner or the world.
We contracted an independent research company to survey senior professionals responsible for the procurement, management and security of mobile devices. Respondents were invited to complete one of two variants of our survey, one focusing on mobile devices (including tablets, laptops enabled with cellular or Wi-Fi connectivity, and mobile phones) and one on IoT devices (such as connected wearables, smart building systems and fleet management systems).
In total, 876 professionals responsible for the buying, managing and security of these devices responded. The charts below break down the demographics of these respondents.
Our sample included both small companies and large enterprises. Company size was not a strong indicator for most of our questions. Unless stated otherwise, all data in this report is from this survey.
Unless stated otherwise, stats quoted in this report are from the mobile respondents.
Details of the source of data and statistics supplied by our contributors are given in the next section.
Let's get started.
Choose your country to view contact details.
- Select Country...
- United States
- Costa Rica
- Hong Kong
- New Zealand
- United Kingdom
- United States
Call for Sales.
Or we'll call you.