It’s the dawn of the mobile data era

How are you using your mobile phone these days?  Many of us are making fewer calls and using a lot more mobile data.  This year the carriers’ revenues are also reflecting this new reality.  Our smartphones aren’t really phones anymore.  Perhaps they are smart devices.  This year phablets (phone + tablet like Samsung’s Galaxy Note) are selling well, and this new form-factor almost takes the phone out of smartphone.

According to a new report from Chetan Sharma Consulting, that tipping point will likely be the this quarter.

“For the third quarter, data accounted for 48 percent of all U.S. mobile industry service revenues, and that percentage is growing quickly. Carriers took in $22.8 billion from data in Q3, up 5 percent from the previous quarter and 15 percent year over year.”

Mobile Data Revenue

With this shift, organizations should focus less on the loss of a device, and more on the protection of the data on the device.

“Smartphones that are used not only for personal calls but also as means to access corporate networks and data. This new reality means that corporations need to secure a perimeter that now extends beyond the desktops in office cubicles to the iPhone and Android devices being used by employees as they sit in the airport. This explosion of devices accessing corporate data has created a new challenge for security professionals that mandates they not only focus on the user’s device, but also on protecting the data itself.”  – InformationWeek.

Just as with the PC age, the hardware went from being the most valuable component to the least – the data on the computer is what mattered, and the device itself became irrelevant.  In our current age, more and more data can be stored in the cloud, and easily accessed across multiple types of devices.  Your users are viewing corporate data at the coffee shop, airport and the waiting room.  Savvy security professionals will recognize that a comprehensive approach is necessary to protect for the mobiles in use in your organization.  It is critical to understand what data is accessed and plan how to keep it all safe.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s