The market is flooded with mobile devices of all sorts. By mobile devices I am specifically referring to computing devices that are small and carried with the user most of the time. These include but are not limited to Smart Phones, Tablets, and PDA’s. The mobile technology is advancing at a very fast pace, and the use of those devices have been accelerating across all sectors. Portio Research predicts that mobile subscribers worldwide will reach 6.9 billion by the end of 2013 and 8 billion by the end of 2016 (Portio Research, 2012). People of all ages are increasingly using those devices on a continuous basis. The computing power of those mobile devices is gradually replacing conventional computers such as desktops and laptops, to the point that mobile devices are now used in business, whether officially or by employees bringing their own mobile devices. What adds to their value to business are the devices’ portability, usability and connectivity to the internet and to corporate networks. These same attributes also pose a set of new security challenges to the enterprise.
Mobile device use has been growing at an unprecedented rate. And their use and adoption in business will grow even more in the coming years. In 2011, the number of smartphones sold exceeded the number of PCs sold. In a few years, the number of mobile devices “will DWARF the number of PCs.” Tablets alone should pass PC sales in 2-3 years (Cocotas, 2012).
The benefits of using mobile devices in a corporate environment include improved productivity, faster sales and reduced costs. On the other hand, the continued surge of those same devices in the enterprise means that more and more of those devices access corporate networks and stores corporate data, creating a greater potential for security breaches or leakage of intellectual property
Cocotas, Alex and Blodget, Henry. The Future of Mobile. Business Insider (2012).