Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

BYOD Trend Exposes Security Policy Gaps

Bring-your-own device (BYOD) sounds like a great idea to improve productivity, but the challenges it poses from a security and IT management perspective continue to trouble organizations large and small.

Bring-your-own device (BYOD) sounds like a great idea to improve productivity, but the challenges it poses from a security and IT management perspective continue to trouble organizations large and small.

What seems to be clear however is that many employees want BYOD – and they want it bad enough, according to a survey released today by the CTIA-The Wireless Association, to do it regardless of policy.  The survey, which was performed by Harris Interactive, fielded answers from 250 Information Technology decision makers and more than 1,000 full-time employed mobile device users.

According to the survey, 47 percent of users said there was no formal policy at their office, which closely matched up with 42 percent of IT experts who said there wasn’t one.

Bring Your Own DeviceDespite the number of organizations without policies, 57 percent of users said they had used their smartphone or tablet as part of BYOD during the year. 

“This does not come as a surprise,” opined Dave Jevans, founder and CTO of mobile security vendor Marble Security. “Many companies have been ignoring the fact that employees use their mobile devices to access email.”

“We have seen that larger companies have BYOD policies and are now implementing security programs to help ensure that user devices are secure when accessing corporate data, assets or cloud services that the corporation gives them access to,” he said. “But, there are many large organizations [that] are looking to add BYOD policies in the coming year.  Many of these companies issued company-owned Blackberry devices and are looking to diversify to employee-owned iPads, iPhones and Android devices.”

According to the CTIA survey, companies with fewer than 500 employees are less likely to take action to protect employees’ mobile devices and less likely to communicate the importance of security to their employees.  Regardless of size, the majority of companies represented in the survey stated they believe it’s the users responsible primarily to protect the device –72 percent of those having less than 500 employees compared to 62 percent among those with 500 or more.

When asked what steps they have taken to protect their device, consumers offered a mix bag. Sixty-three percent said they have installed or used software updates, and 58 percent were using passwords and or PINs. Just 43 percent said they were using antivirus.

In a separate report, Marble Security found more than half of the respondents were not aware of advanced persistent threats targeting mobile devices, and 45 percent were unaware that spear phishing attacks could be a problem for mobile users. 

Advertisement. Scroll to continue reading.

Jevans suggested organizations enforce device password policies and require devices not be jailbroken or rooted.  Organizations should also consider requiring devices be at the latest operating system level within 30 days of its release, and require users to use an anti-malware or app scanning product if they are using an Google Android device.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.