Form cover
Page 1 of 1

Mobile Device Security

Please answer all questions to the best of your ability so your answers can be used for research purposes.

Which of the following devices do you use primarily?

Which of the following devices do you use primarily?

Do you use a personal device for work-related purposes?

Do you use a personal device for work-related purposes?
A
B
C
D

Does your workplace have a mobile device or bring-your-own-device (BYOD) policy?

Does your workplace have a mobile device or bring-your-own-device (BYOD) policy?
A
B
C
D
E

On a scale of 1 to 10, what would you consider your awareness of social engineering attacks (like phishing, smishing and vishing) to be?

On a scale of 1 to 10, what would you consider your awareness of social engineering attacks (like phishing, smishing and vishing) to be?
1 = What are they?10 = I know what those are

Have you ever received a potential social engineering attack before?

Have you ever received a potential social engineering attack before?
A
B
C
D

Which of the following have you heard of?

Which of the following have you heard of?

How often do you update your mobile device?

How often do you update your mobile device?
A
B
C
D

Which of these security measures do you use on your mobile device?

Which of these security measures do you use on your mobile device?

How confident would you say you are that you would recognise a social engineering attempt on your mobile device?

How confident would you say you are that you would recognise a social engineering attempt on your mobile device?
1 = Not confident10 = Very confident

How significant is the risk of social engineering through mobile devices to businesses in your opinion?

How significant is the risk of social engineering through mobile devices to businesses in your opinion?
1 = Not significant10 = Extremely significant

Have you ever been offered training on mobile device security or social engineering?

Have you ever been offered training on mobile device security or social engineering?
A
B
C
D

If you can, describe an experience where you or someone you know received a social engineering attempt on a mobile device, what happened and how it was handled

Do organisations do a good job at protecting employees from social engineering threats on mobile devices?

Do organisations do a good job at protecting employees from social engineering threats on mobile devices?
1 = They don't10 = They could not be any better

How could organisations do better at protecting employees from social engineering threats on mobile devices in your opinion?