62% of enterprise organizations say that mobile computing initiatives have made security management and operations more difficult. 31% of organizations claim that they have a problematic shortage of mobile computing security skills. 25% of enterprises claim that mobile device visibility is their weakest area of security monitoring. The cumulative impact of immature insecure technology, thousands of new network nodes, limited mobile security skills, and an existing workload are being virtually ignored. When security is an after-thought the CISO and his or her team are always fighting uphill. Mobile computing security must accommodate new business processes, new risks, and privacy requirements at scale.”]
Source: https://www.csoonline.com/article/2224604/mobile-computing-security-mayhem-continues.html

