Loading...

23 May 2026 20:50

Mobile & Digital

Lost and Stolen Mobiles: ‘A data disaster waiting to happen’?

Oracle survey suggests that younger workers need to be more cautious with their mobile devices, highlighting a serious security concern for businesses

News Summary

New research from Oracle has revealed that younger business workers are far more likely to find a way to access work data and applications on their mobile device – with or without their employers’ consent – yet they are also the most likely to lose their mobile device or, worse, have it stolen. With this new generation of mobile users working their way into businesses around the world, Oracle highlights the need for organizations to secure their business from the device right through to the data center.

Key News Facts

Young workers around the world are embracing mobility in the workplace, but they are also far more likely to lose their mobile devices, or have them stolen, than their more seasoned colleagues:

71% of workers aged 16-24 are using work applications on personal mobile devices.

73% admit to having lost at least one mobile device and 52% have had at least one stolen.

Among 45 – 54 year olds meanwhile, device theft is at just 20% and losses at 36%

In fact, it seems the 16-24-year-old category are constantly finding new and interesting ways to lose or damage a mobile device:

53% have damaged a device by spilling a drink on it

51% have dropped their mobile phone into a toilet

49% have damaged a mobile device by sitting on it

…and 44% have lost or damaged a mobile phone in a way they were too embarrassed to admit to

Businesses should be embracing mobile platforms, but some are being put off by clearly well-founded concerns about the security of mobile devices:

Only 24% of respondents said their company actively encourages mobile working, in India this figure is higher than the average at 31%

39% believe fears about the security of devices are a major obstacle for their bosses, falling to 37% in India

Supporting Quotes

“Today employees of all ages are attached to their mobile devices and take them wherever they go. It is little wonder therefore that so many devices are getting lost or stolen, especially at a time when mobile working is becoming more widespread. While we can laugh at some of the more outlandish ways devices are lost, these findings are a real concern for businesses that are serious about securing their data. A stolen phone for a consumer, perhaps, costs a few hundred dollars and the loss of treasured photos, music, etc. But for a business the pain is much greater, potentially creating a security hole in its enterprise information management strategy.

“The solution to this challenge is not to limit mobile working, which serves only to reduce productivity, but instead to put in place a robust security platform. Oracle is advising businesses to ensure they have in place and approach to IT and mobile application management (MAM), which gives them confidence in what data employees can access on their mobile devices. Through containerization and feature-rich MAM capabilities, businesses can enable user convenience for their employees while also ensuring their corporate date remains secure, no matter where their employees’ devices end up. With this approach, we can give the CIO no compromises on security and a the same time we give the LOB owner the user experience to be intact”

Authored by Suhas.Uliyar, VP Mobile Strategy, Product Management, Oracle

About the Research

Censuswide carried out the research on behalf of Oracle, surveying 1,500 professionals working for global organizations: 500 in North America, 500 in EMEA and 500 in APAC.

NULL
(Visited 17 times, 1 visits today)
peri hokiperihokiduta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76duta76duta76bduta76 sejiwaduta76 lokasiterdekatduta76 africafuelduta76 oscarmykeduta76 naptimepkduta76 daikinduta76 raes-munichanalisis data konsistensi rtp pragmatic play starlight princess pekan inieksperimen putaran konstan pola scatter pg soft lebih cepatstrategi akumulasi simbol wild beruntun habanero peluang kemenangancara mengidentifikasi momentum perubahan sistem perkalian pragmatic playkombinasi unik scatter free spin mengubah hasil pg softpenyelidikan mandiri fluktuasi rtp live performa habanero stabilevaluasi algoritma pg soft lonjakan aktivitas pemain mahjong ways 2koi gate lonjakan rtp menjelang tengah malam kompetitifmenilik performa multiplier besar gates of olympus manajemen modalsinkronisasi taktik analisa pola mahjong wild gates of olympus dadu sicbooptimalisasi strategi blackjack pola mahjong ways 2 pgsoft rtp live starlight princessarsitektur peluang teknik jitu blackjack analisa mahjong wins 3 pragmatic sweet bonanzakalibrasi cara pakai rtp live strategi roulette taktik mahjong ways 2 pgsoft wild west goldcetak biru strategi blackjack teknik sv388 analisa peluang sugar rush mahjong wins 3 pragmaticlaporan pengujian ritme putaran fitur unggulan pragmatic playmahjong ways 2 warisan lokal simbol budaya modern stabilitas sosialstruktur algoritma stabilitas hasil mekanik mahjong ways analitis detailhubungan fluktiasi rtp live performakombinasi unik simbol hasil pgsoftmomentum perubahan perkalian pragmatic playlonjakan rahasia frekuensi mahjong ways 2perofrma multiplier besar olympusteori rtp koi gate tengah malampola wild bandito rtp livemahjong wins pola scatter wildanalisa taktik silang pola mahjong wild deluxe peluang dadu usicbo rtp live gates of olympuspemetaan taktik cerdas strategi peluang baccarat teknik pola analisa rtp live starlight princess mahjong ways 2 pgsoftstrategi hibrida kuantitatif analisa peluang blackjack teknik pola taktik rtp live mahjong wins 3 pragmatic sweet bonanzametodologi hibrida cerdas taktik peluang roulette analisa strategi pola rtp live mahjong ways 2 pgsoft wild west goldsinkronisasi strategi pro teknik peluang blackjack sv388 analisa pola rtp live sugar rush mahjong wins 3 pragmaticeksekusi taktik jitu dengan presisi analisa rtp gates of olympus teknik pola mahjong wild deluxe dadu sicboanalisa teknik kuantitatif peluang baccarat strategi pola rtp live mahjong ways 2 pgsoft starlight princesssinkronisasi strategi pro analisa peluang taktik blackjack teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzamasterclass eksekusi cerdas analisa peluang roulette strategi pola teknik rtp live mahjong ways 2 pgsoft wild west goldblueprint taktik presisi strategi peluang blackjack sv388 analisa teknik pola rtp live sugar rush mahjong wins 3 pragmaticalgoritma terbaru scatter emas mahjong wins 3 investigasidetik wild konek beruntun mahjong ways klasik permainanfenomena scatter merah mahjong ways 2 sistem keamananpembuktian scatter hitam mahjong ways 2 komunitas pg softrahasia kombinasi wild berjejer mahjong wins pembayaran drastis323324325326327328329330331332penguraian multiplier starlight princessdistribusi wild wild bounty showdowncara membaca rtp mahjong ways 2analisis inferensial pola gates of olympus objektif sisteminovasi grafis pgsoft transisi gambar lebih responsif modernkarakteristik simbol emas mahjong ways 2 pertengahan sesimemanfaatkan ritme putaran mahjong ways 2 server stabilsolusi cerdas volatilitas starlight princess sistem putaranskalabilitas engine html5 multiplier mahjong ways 2mekanisme threading server komputasi mahjong wins 3dekonstruksi algoritma spasial koordinat scatter hitamstudi desain ux interaktif frame emas mahjong ways 2audit protokol enkripsi data rtp mahjong wins 3distribusi rtp gates of olympusinterpretasi rtp mahjong ways Top