Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Small Business

    BYOD Programs Expose Businesses to Security Risks

    Written by

    Nathan Eddy
    Published September 30, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Seventy-one percent of employed Americans who own personal mobile devices are able to connect them to the secure network provided by an employer, but do not take the proper precautions to safeguard their devices or the data they have access to, according to a Bitdefender study of 1,045 Internet users in the United States.

      According to the respondents, 29.7 percent of bring-your-own-device (BYOD) users would share their personal mobile devices with friends or family members even if they hold critical company data.

      Demographically, employees between the ages of 45 and 64 are sharing their devices to a lower extent, while those with low education are more open to sharing.

      “Most likely, BYOD users do not perceive their devices and the way they store corporate information pose a real threat to the company itself. Most of the time, the smartphone is still perceived as a mobile phone rather than a miniature computer, although the latter better describes it as a device,” Bogdan Botezatu, senior e-threat analyst at Bitdefender, told eWEEK. “Also, convenience seems to trump security and users would rather leave their phone’s display always unlocked than having to deal with the pattern or pin-based unlock mechanism every time they check their e-mail or social network activity.”

      Botezatu noted that while an informed employee is effective and empowered, large companies unfortunately have to survive with undersized IT teams that barely have the necessary time to deal with mission-critical issues, and they seldom train all the employees and explain the indirect technological implication of mobile device misuse.

      The report found 39.7 percent of the users who connect personal mobile devices, such as laptops, tablets and phones, to the company network do not have any lock-screen mechanism set in place.

      If lost or stolen, these devices would immediately expose their contents (private and work-related information) to unauthorized third parties, which puts the company in a weak position.

      In contrast, only 9.1 percent of BYOD users rely on biometric features (such as face, voice or fingerprint recognition) as the preferred method for unlocking their mobile devices.

      In order to prevent or minimize these occurrences, Botezatu said training could be done either directly, in a similar manner fire or hazard training is done, or remotely, as part of the corporate newsletter.

      He said training should be doubled by a mobile device management (MDM) solution to ensure that certain aspects–such as remote wipe and screen lock features–are enforced by default before joining the corporate intranet or Internet.

      “BYOD has already diminished the authority of the IT teams, as they can hardly stay in control with mobile devices. After all, the devices and software running atop are the property of the user, not of the company the user is working for,” Botezatu said. “What the IT teams should start looking after now is not so much the security of the device, but rather the security of the company data stored on it.”

      He noted there are a number of MDM solutions available, but the most effective ones are the enterprise solutions that blend MDM with antimalware and intrusion detection.

      Nathan Eddy
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.