BYOD threats have infiltrated organizations
Posted on 13 November 2012.
The vast majority of organizations that allow employees to BYOD are experiencing high rates of mobile threats, including lost or stolen devices, malware, and compromised company data.


Conducted by Webroot, the study exposes that the popular trend of allowing employees to use their smartphones and tablets at work is causing a significant drain on IT resources while at the same time putting corporate data at risk.

The study, which focused on mobile security decision-makers in the United States, United Kingdom and Australia, found an overwhelming 82 percent of respondents believe that mobile devices create a high security risk within the corporate environment.

Results show that mobile security is a high priority for half of the companies supporting BYOD, equating to increased help desk support and consumption of valuable IT resources. In addition, 45 percent reported lost or stolen devices in the past year and 24 percent experienced mobile malware infections, crippling productivity and potentially compromising company and customer data.

However, larger organizations, those with 500 or more employees, are at even higher risk. According to the study, 67 percent had dealt with lost or stolen mobile devices and 32 percent had experienced mobile malware infections, creating widespread concern about the business impact of employee-owned devices within the enterprise.

Top-level corporate study findings:
  • 63 percent of companies reported significant increases in demand for help desk support to repair, replace or manage the security of smartphones and tablets in the company, consuming as much as 36 percent of one help desk technician's time resolving these issues each month.
  • 61 percent required additional IT resources to manage mobile security, resulting in higher costs.
  • More than half reported mobile threats reduced employee productivity and disrupted business activities.
  • Two-thirds of companies (67 percent) agree that the management of mobile device security is a great burden on IT resources.
  • 46 percent of BYOD companies have implemented mobile security, but only 40 percent of companies with fewer than 100 employees have mobile security.
Webroot advises that companies take the following steps to reduce the risks associated with BYOD:
  • Establish device control policies: Create a policy that governs how your corporate IT staff can gain control over a personal device while maintaining your network security. Include information about how to keep personal information private (e.g., via a mobile device backup strategy such as containerization that doesn't touch personal data) and define corporate ownership over data and applications.
  • Enforce device-level security: Both corporate-owned and personal devices should have secure passwords and screen locks; document this requirement in your mobile device policies. In addition, require that personal and corporate mobile devices maintain up-to-date, corporate-approved (and preferably corporate-managed) security software installed to guard against malware and other security risks.
  • Develop and deliver mobile workforce security training: Security training will keep your mobile workforce productive and prepared to be the first line of defense against malware and other security threats to their mobile devices. Spell out your corporate policies and include a participant sign-off stating that they understand and will abide by the policies.
  • Let your business drive mobile device security policies and training: Business requirements and culture drive the policies, training and other upfront work you do to support your mobile workforce security needs.
"Cyber criminals are increasingly targeting employees as access portals to a company's infrastructure, intensifying the need for controls and layered defenses that can identify and mitigate attacks," said Jacques Erasmus, chief information security officer at Webroot. "As the popularity of employee-owned devices in the workplace continues to grow, this defense needs to be supplemented with a coherent but simple BYOD management strategy, underpinned by three elements: device control policies, device-level security and mobile workforce security training."

The complete report is available here.





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //