Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

BYOD Circumventing Enterprise Security Policies, Survey

According to the results of a study released today by Websense, the Bring-Your-Own-Device phenomenon is growing, and with the trend, employees are often circumventing corporate security policies. The results showed that seventy-seven percent of the 4,000 people interviewed said that mobile devices are mission critical when it comes to getting work done, but within that same group 76-percent believe that their mission critical devices place the organization at risk.

According to the results of a study released today by Websense, the Bring-Your-Own-Device phenomenon is growing, and with the trend, employees are often circumventing corporate security policies. The results showed that seventy-seven percent of the 4,000 people interviewed said that mobile devices are mission critical when it comes to getting work done, but within that same group 76-percent believe that their mission critical devices place the organization at risk.

“IT has spent years working on desktop security and trying to prevent data loss over web and email channels—but mobile devices are radically changing the game,” said Tom Clare, senior director of Product Marketing Management at Websense. “Tablets and iOS devices are replacing corporate laptops as employees bring-their-own-devices to work and access corporate information. These devices open the door to unprecedented loss of sensitive data. IT needs to be concerned about the data that mobile devices access and not the device itself.”

Previously in a similar Ponemon Institute survey, IT respondents said 63 percent of breaches occurred as a result of mobile devices. With that in mind, here are some of today’s key findings.

– Fifty-nine percent of respondents report that employees circumvent or disengage security features, such as passwords and key locks, on corporate and personal mobile devices.

– Seventy-seven percent of respondents agree that the use of mobile devices in the workplace is important to achieving business objectives. A similar percentage (76 percent) believes that these tools put their organizations at risk. Only 39 percent have the necessary security controls to address the risk, and only 45 percent have enforceable policies.

– Sixty-five percent of respondents are most concerned with employees taking photos or videos in the workplace — probably due to fears about the theft or exposure of confidential information. Other unacceptable uses include downloading and using internet apps (44 percent) and using personal email accounts (43 percent). Forty-two percent say that downloading confidential data onto devices (USB or Bluetooth) is not acceptable in their organizations.

“We asked thousands of IT security professionals and mobile devices were overwhelmingly important to business objectives,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute.

“However, mobile devices put organizations at risk—risks that they do not have the necessary security controls and enforceable policies to address. It’s also clear that employees are deliberately disabling security controls, which is a serious concern.”

The results of a separate survey released today by Trend Micro at Mobile World Congress 2012 in Barcelona, showed that 78 percent of companies permit employees to use their personal devices for work related activities. Disturbingly, the report showed that almost half of companies that permit BYOD reported having a data or security breach as a result of an employee owned device accessing the corporate network (46.7%). The survey also showed that virtually all companies surveyed apply an IT security policy to employee owned devices that access the company network (89.1%), and also require that devices either be on a preapproved list and/or preapproved with security software installed (53.7%).

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.