A recent study by the Business Performance Management (BPM) Forum found that U.S. companies face increased security and compliance risks from executives using mobile devices, an article on Image and Data Manager online reports.With the increasing use of mobile devices worldwide, the study results showed that workplaces worldwide are becoming increasingly exposed to regulatory compliance violations and security threats with the devices’ integration into company networks.The article also states that research found many companies have too few policies in place to protect the data on mobile devices, and even fewer have the ability to enforce these policies.BPM also cited a recent IDC report in its study, which projected the number of global mobile employees would grow beyond 878 million by 2009. IDC’s report, “Comply on the Fly: Keeping Pace with the Management Challenges of Mobile Data Management,” explores whether businesses are implementing initiatives to provide internal controls and address data security risks from mobile device use. The IDC report contained the following information:Nearly half of all respondents report that a minimum of 25 percent of all mobile devices in their organization carry mission-critical applications and information.Forty percent of respondents have no measures at all to manage mobile data tracking, backup and archiving for regulatory compliance purposes.Smaller companies ($100 million in revenue and under) face a greater risk of violations, with just 32.4 percent implementing formal mobile compliance policies.There is disconnect between IT executives who recognize mobile device compliance and security risks, and C-level executives who see benefits, not risks.Compiled by Paul Kerstein, CSOonline.com Related Links:• How To Protect Your Mobile Data• Managing and Securing Mobile DevicesKeep checking in at our Security Feed for updated news coverage. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe