A straightforward phone conversation designed to steal user passwords is still the most likely security threat, according to industry experts.
Martin Crossley, head of commercial evaluation for fraud and revenue insurance at France Telecom, said that most companies' security policies do not warn staff to be aware of something as simple as a phone call claiming to be from the IT department asking them to confirm their password details.
"One of the questions when you're thinking about this whole area is which applications represent the greatest threat, and in most circumstances it will be something as straightforward as voice," he said.
"I can speak with personal knowledge from a fraud investigation, that something like 70 to 80 per cent of all security breaches occur from a phone conversation or a straightforward deception."
Crossley explained that another major threat comes from people allowing free access to their voicemail accounts by not setting a Pin.
Cynthia Gordon, vice president of marketing at Orange Business Services, maintained that the study showed that not enough companies are taking their responsibilities seriously.
"Reading the report, 45 per cent of companies say they don't have a security policy or, in a way even worse, they don't have a culture of enforcing it," she said.
Controlling the use of mobile devices is seen as an important way of cutting the security risk to a business, as users are frequently cited as the weakest link in a security chain.
"If people have a good attitude and do the right things there is less need for control," said Rob Bamforth of analyst firm Quocirca, which prepared the white paper.
"But you have to accept that at a certain point you need to apply some control. This may be applied to the technology or it may need to be applied at an HR level."
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software