Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile
    • Small Business

    Businesses Lack Enforceable Policy, Control Over Mobile Workers

    Written by

    Nathan Eddy
    Published May 16, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      At more than 64 percent of businesses, a majority of mobile workforces can access their organizations’ secure data remotely, yet less than 25 percent of businesses have sufficient policies and controls in place for mobile media, such as USB drives, according to a survey of 330 IT and security professionals.

      The survey, conducted by SANS and sponsored by information security company Imation, found another 25 percent admitted to having no controls—such as policy or technical controls enforced by centralized management—in place.

      Malware introduced through unmanaged devices is a top data exposure risk (13.6 percent), the survey found.

      Loss or theft of corporate devices was also a major concern for 12.6 percent of respondents—only 13 percent of firms with more than 10,000 employees and 7 percent with 500 to 10,000 employees said they encrypt data on their USB devices.

      According to the survey, 32 percent of organizations expect at least 60 percent of their workforce to be mobile in the next 12 months.

      “Mobile devices and BYOD [bring-your-own-device] policies serve the needs of a fast-evolving, mobile workforce by giving employees the flexibility to be productive anytime, anywhere,” Ken Jones, vice president of engineering and product management at Imation, told eWEEK. “Yet this array of devices, including the use of personal laptops, tablets and USB drives, creates a huge burden on IT resources to support and proactively prevent security gaps, data breaches, malware attacks, and lost or stolen devices used by employees that can severely compromise the enterprise.”

      IT needs to do this all while meeting data compliance and legislative protocols often associated with highly regulated industries, Jones noted.

      “Enterprises need to ensure devices feature military-grade hardware encryption, built-in password policies, virus and malware protection, and centralized management solutions that support remote wipe or disable capabilities of lost or stolen devices,” he said. “It’s imperative they control data transport and usage to protect their critical, high-value data. And with the opportunity for personal device usage, they also need to ensure the separation of personal and corporate data.”

      Currently, 63 percent of mobile workers use computer hard drives, not a managed secure point of access, to access corporate data.

      More than half of respondents reported mobile media (USB drives) is unmanaged, and 43 percent do not manage all the desktops used by mobile workers.

      Although 84 percent responded that security is high, extremely high or critical for a mobile workforce, nearly one-third of respondents admitted to being unaware if their organization has been breached in the last 12 months.

      “As enterprises look to enable mobility and BYOD, computing devices such as laptops and tablets are a large part of their mobile security initiatives,” Jones said. “Employees—as well as contractors and temporary workers—use their own personal computers, which often have more computing power and advanced features than corporate systems, saving IT on the cost of hardware. Solutions need to be simple enough for users to use while also delivering the security and manageability to meet enterprise IT security and compliance requirements.”

      Nathan Eddy
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×