Loading...

12 Mar 2026 06:00

Mobile & Digital

Lost and Stolen Mobiles: ‘A data disaster waiting to happen’?

Oracle survey suggests that younger workers need to be more cautious with their mobile devices, highlighting a serious security concern for businesses

News Summary

New research from Oracle has revealed that younger business workers are far more likely to find a way to access work data and applications on their mobile device – with or without their employers’ consent – yet they are also the most likely to lose their mobile device or, worse, have it stolen. With this new generation of mobile users working their way into businesses around the world, Oracle highlights the need for organizations to secure their business from the device right through to the data center.

Key News Facts

Young workers around the world are embracing mobility in the workplace, but they are also far more likely to lose their mobile devices, or have them stolen, than their more seasoned colleagues:

71% of workers aged 16-24 are using work applications on personal mobile devices.

73% admit to having lost at least one mobile device and 52% have had at least one stolen.

Among 45 – 54 year olds meanwhile, device theft is at just 20% and losses at 36%

In fact, it seems the 16-24-year-old category are constantly finding new and interesting ways to lose or damage a mobile device:

53% have damaged a device by spilling a drink on it

51% have dropped their mobile phone into a toilet

49% have damaged a mobile device by sitting on it

…and 44% have lost or damaged a mobile phone in a way they were too embarrassed to admit to

Businesses should be embracing mobile platforms, but some are being put off by clearly well-founded concerns about the security of mobile devices:

Only 24% of respondents said their company actively encourages mobile working, in India this figure is higher than the average at 31%

39% believe fears about the security of devices are a major obstacle for their bosses, falling to 37% in India

Supporting Quotes

“Today employees of all ages are attached to their mobile devices and take them wherever they go. It is little wonder therefore that so many devices are getting lost or stolen, especially at a time when mobile working is becoming more widespread. While we can laugh at some of the more outlandish ways devices are lost, these findings are a real concern for businesses that are serious about securing their data. A stolen phone for a consumer, perhaps, costs a few hundred dollars and the loss of treasured photos, music, etc. But for a business the pain is much greater, potentially creating a security hole in its enterprise information management strategy.

“The solution to this challenge is not to limit mobile working, which serves only to reduce productivity, but instead to put in place a robust security platform. Oracle is advising businesses to ensure they have in place and approach to IT and mobile application management (MAM), which gives them confidence in what data employees can access on their mobile devices. Through containerization and feature-rich MAM capabilities, businesses can enable user convenience for their employees while also ensuring their corporate date remains secure, no matter where their employees’ devices end up. With this approach, we can give the CIO no compromises on security and a the same time we give the LOB owner the user experience to be intact”

Authored by Suhas.Uliyar, VP Mobile Strategy, Product Management, Oracle

About the Research

Censuswide carried out the research on behalf of Oracle, surveying 1,500 professionals working for global organizations: 500 in North America, 500 in EMEA and 500 in APAC.

NULL
(Visited 10 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINaws korelasi parameter mahjong waysaws teori permainan mahjong ways3aws manajemen risiko gates olympusaws breakdown volatilitas mahjong winsaws model stokastik sweet bonanzaaws tren rtp intensitas scatteraws metode analisis mahjong winsaws pemantauan rtp live pgsoftaws fase tenang mahjong waysaws wild emas olympus multiplieraws evaluasi sesi mahjong waysaws grid terbuka reaksi berantaiaws diskusi komunitas mahjong waysaws jadwal bermain mahjong waysaws tren digital mahjong waysaws sinkronisasi reel mahjong waysaws perilaku pemain mahjong winsaws atmosfer malam mahjong wayscara menguak teknik cerdas mahjong wild deluxe dadu sicbo gates of olympus perihoki paling barutatktik analisa pola dan strategi terapan mahjong ways 2 pgsoft baccarat starlight princess perihokipanduan mudah teknik peluang dan analisa mahjong wins 3 pragmatic blackjack sweet bonanza perihokimenyingkap tabir teknik peluang dan rtp live roulette mahjong ways 2 pgsoft wild west gold perihokikombinasi unik gunakan pola dan analisa cerdas mahjong wins 3 pragmatic blackjack sugar rush sv388 perihokipola strategi terbaik untuk menang mahjong wild deluxe dadu sicbo gates of olympus duta76tata cara menguasai teknik dan strategi menang mahjong ways 2 pgsoft starlight princess duta76taktik paling unggul dan pola rahasia mahjong wins 3 pragmatic blackjack sweet bonanza duta76peta peluang strategi terapan duta76 main mahjong ways 2 pgsof roulette wild west gold roulette duta76eksperimen lengkap teknik serta taktik menang mahjong wins 3 sugar rush blackjack duta76persistensi sesi walk of shame indikator stabilakselerasi mahjong princess teknologi cloudsimulasi probabilistik roma fastspin distribusi hasilintegrasi perencanaan sesi golden horse ridelogika pola dragon ball 63 jutaaws pola rtp konsistensi sesiaws momentum rtp live mahjongaws dc off turbo aztecaws momentum scatter wild rtpaws strategi algoritma rtp mahjongaws jackpot progresif mahjong waysaws siklus rtp mahjong winsaws fluktuasi rtp scatter hitamaws observasi rtp scatter hitamaws analisis rtp wild bountyaws kontrol optimal sweet bonanzaaws risiko modal kaskade bonanzaaws update rtp live harianaws rtp live permainan ramaiaws ritme visual mahjong winsaws ritme spin mahjong winsaws rotasi dinamis mahjong winsaws pola andalan mahjong waysaws transisi kecepatan mahjong winsaws sesi tenang mahjong waysaws analisis mahjong jam efektifaws analisis pola frekuensi mahjong waysaws eksplorasi mahjong ways bonusaws evaluasi fase sweet bonanzaaws inovasi platform pgsoft rtpaws jalur multiplier mahjong bonanzaaws kerangka strategi rasional lucky nekoaws observasi baccarat ritme malamaws observasi wild mahjong malamaws panduan membaca roadmap rtp liveaws perencanaan distribusi modal mahjong winsaws perencanaan laju mahjong sistemaws rekonfigurasi analisis bonus mahjong waysaws rotasi mahjong eskalasi intensitasaws strategi finansial mahjong wins 3aws strategi lengkap bermain mahjong winsaws strategi presisi fluktuasi rtp pg softaws teknik strategi mahjong wins 3aws teori permainan mahjong ways 2aws transformasi digital rtp pg softmanual algoritma glory of rome 95 persenmanajemen sesi mahjong ways 3 ramadan 2026formula great rhino megaways 97 persensinergi tata kelola modal aztec gemsinvestigasi gpu cloud madame destiny responsifsinkronisasi durasi sesi 5 lions megawaysprotokol algoritma thor megaways 48 jutaskema efektivitas bigger bass bonanza 16 jutaobservasi pola jokers jewels tingkat keberhasilankonsistensi pola dragon hatch 17 jutaaws antarmuka mahjong navigasi adaptifaws dimensi paralel mahjong wins3aws dinamika tren permainan onlineaws evaluasi variansi data rtpaws interaksi komunitas mahjong waysaws jejak esoterik mahjong wins3aws laporan riset rtp pgsoftaws lonjakan multiplier mahjong wins3aws monitoring data starlight princessaws navigasi server thailand mahjongaws panduan pola sweet bonanzaaws pemantauan rtp harian realtimeaws pemetaan struktur data rtpaws pendekatan ritme sweet bonanzaaws perbandingan server mahjong waysaws persilangan mahjong wins3 sugaraws ritme bandito algoritmaaws ritme sesi mahjong ways2aws transformasi putaran akhir mahjongaws variansi performa dinamika rtp Top