BYOD Brings Greater Productivity—as Well as Security Issues

 
 
By Jeffrey Burt  |  Posted 2016-04-08
 
 
 
 
 
 
 
 
 
  • Previous
    1 - BYOD Brings Greater Productivity—as Well as Security Issues
    Next

    BYOD Brings Greater Productivity—as Well as Security Issues

    While employees are helping to drive the adoption of BYOD, companies have different policies about who participates, the platforms available and more.
  • Previous
    2 - It's All About the Employees
    Next

    It's All About the Employees

    According to the survey, it is employee-related concerns driving the adoption of BYOD. Improved employee mobility came in first at 61 percent, followed by greater employee satisfaction (56 percent) and increased employee productivity (55 percent). Coming in fourth, at 47 percent, was reduced costs.
  • Previous
    3 - BYOD Adoption Among Businesses Varies
    Next

    BYOD Adoption Among Businesses Varies

    Forty percent of survey respondents say BYOD is open to all employees, while 32 percent say it's available to select employees. However, 13 percent have no plans for BYOD adoption, and 9 percent don't currently support it, though they plan to in the next 12 months. Three percent tried it, but abandoned it.
  • Previous
    4 - No Surprise: Security Is the Top Barrier
    Next

    No Surprise: Security Is the Top Barrier

    Thirty-nine percent say the top hurdle to BYOD adoption is security, while 15 percent say there is no resistance. For another 12 percent, the challenge is employee privacy concerns.
  • Previous
    5 - There Are Plenty of Security Concerns
    Next

    There Are Plenty of Security Concerns

    Chief among them, at 72 percent, is data leakage and loss. Crunched together after that are unauthorized access to company data and systems (56 percent), users downloading unsafe apps or content (54 percent) and malware (52 percent).
  • Previous
    6 - Protection Is What's Needed in Mobile Security
    Next

    Protection Is What's Needed in Mobile Security

    Forty-two percent say they need technology that detects and remediates threats based on corporate policy. Thirty-three percent say they want a solution that integrates with their existing networks, and 15 percent want something that sees all affected devices and threats.
  • Previous
    7 - Security Threats Are Increasing, but Not Most Security Budgets
    Next

    Security Threats Are Increasing, but Not Most Security Budgets

    Thirty-seven percent of respondents say their budgets are staying flat, while 30 percent say theirs will increase. Seven percent will see their budgets decline.
  • Previous
    8 - Beware the Malware
    Next

    Beware the Malware

    When asked if any of their company's corporate-owned or BYO devices has downloaded malware in the past, 39 percent said yes, another 26 percent said no and 35 percent were unsure. However, while 21 percent said that mobile devices had been involved in security breaches at the companies, 42 percent said they hadn't. Thirty-seven percent were unsure.
  • Previous
    9 - Applications and BYOD
    Next

    Applications and BYOD

    Email, calendar and contacts management, at 84 percent, are the most popular applications on BYOD mobile devices. Document accessing and editing, access to SharePoint and the intranet, and video conferencing follow far behind.
  • Previous
    10 - Apple, Android the Top Platforms Supported on BYOD
    Next

    Apple, Android the Top Platforms Supported on BYOD

    Seventy-seven percent of respondents said their BYOD policies support Apple's iOS operating system, while 75 percent said they support Google's Android. Microsoft Windows, at 60 percent, and Mac OS X, at 32 percent, come in next.
  • Previous
    11 - There's No Standard for Support of Mobile Devices
    Next

    There's No Standard for Support of Mobile Devices

    For 32 percent of respondents, there's no formal process. Instead, there's ad hoc support from the desk. For another 27 percent, support from the help desk is limited to designated models. Twenty-three percent of companies said their employees are on their own when problems arise with their BYO devices, while 15 percent offer full support.
  • Previous
    12 - Protecting the Mobile Device
    Next

    Protecting the Mobile Device

    The most popular way to protect mobile devices—at 63 percent—is through passwords. That's followed by remote wipe (49 percent), device encryption (43 percent), and data removal when an employee leaves or device disposal (38 percent).
  • Previous
    13 - Protecting the Data Downloaded Onto the Mobile Device
    Next

    Protecting the Data Downloaded Onto the Mobile Device

    Forty-three percent of respondents said their companies use mobile device management (MDM) tools, while 28 percent use endpoint security tools—such as malware protection—and 27 percent use network access control (NAC).
  • Previous
    14 - A Lot of Things Are Needed in Mobile Application Management
    Next

    A Lot of Things Are Needed in Mobile Application Management

    The needs include logging, monitoring and reporting (according to 80 percent of respondents), malware protection (79 percent) and vulnerability exploit defense (71 percent). Easy deployment, network and WiFi attack defense and cross-platform support also are important.
  • Previous
    15 - Wiping the Mobile Device Is Important, but Not Often Done
    Next

    Wiping the Mobile Device Is Important, but Not Often Done

    When an employee leaves the company, only 34 percent of respondents said their companies wipe the device 100 percent of the time. Fourteen percent said their companies never do it, while 29 percent said they do it sometimes.
 

The bring-your-own-device (BYOD) trend continues to be perplexing for many enterprises. It holds the promise of greater employee productivity and mobility, but also comes with its share of security problems. Past studies and surveys note the benefits and challenges of BYOD, but also stress the need for businesses to adopt policies to manage and secure the devices coming onto the network. A new survey by Crowd Research Partners—along with data security vendors like Bitglass, Check Point Software, Tenable Network Security and Blancco Technology Group—puts much of that into greater focus. The group surveyed more than 800 cyber-security pros who are part of the 300,000-member Information Security Community on LinkedIn. "Increased productivity and employee satisfaction continue to drive adoption of BYOD and enterprise mobility," said Holger Schulze, founder of the Information Security Community, adding that the survey "reveals that enterprise security risks and mobile data breaches are on the rise. While these threats can significantly impact the success of BYOD initiatives and place a burden on IT support staff, this is also an opportunity for organizations to implement effective cyber-security solutions."

 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel