Secure BYOD (Bring your own device)

Secure BYOD (Bring your own device)

26 members
  • Join

    When you join a group, other members will be able to see your profile and message you. The group logo will be visible on your profile unless you change that setting.

  • Information and settings

Have something to say? Join LinkedIn for free to participate in the conversation. When you join, you can comment and post your own discussions.

Zuber S.

Zuber

BT survey reveals BYOD risks

Regional Product Sales Manager - Information Security

BT survey reveals BYOD risks

A BT survey of more than 2,000 users and IT decision makers across 11 countries has revealed that risks to business are moving too fast for a purely reactive security approach to be successful.

According to the BT "Rethink the Risk" report, the traditional secure outer perimeter of enterprise networks no longer exists, meaning that specific tools are required to measure, understand and address this new security reality.

According to the research, cyber security threats, accidental or intentional employee data loss and increasing use of personal devices on employer's networks are the three biggest security risks perceived by IT decision-makers.

In particular, BYOD is making progress within the corporate environment, with 60% of employees using personal devices for work, with especially high usage in countries such as China and India (92% and 80%)

The research also showed that 82% of companies say they already allow BYOD or will do within the next 24 months. The adoption of BYOD brings to light new security issues. Four out of ten companies have experienced security breaches due to people bringing in unauthorised devices. Of those companies that do have a BYOD policy, security was by far the biggest challenge at 74%.

The board and senior management are the second largest group of people demanding BYOD, just behind IT people and power users.

Published May 3, 2012

itp.net itp.net

  • Flag as Inappropriate
  • Comment (1)
  • May 7, 2012
  • Close viewer

Comments

  • Jeff

    Jeff S.

    Owner, RF Commerce

    BYOD is both a challenge and an opportunity. Our research indicates the average medium to large organization may have a one or two page BYOD Policy statement, but very few have comprehensive policies and signature agreements spelling out what is acceptable and what are the consequences. For instance, if a Company wipes out a smartphone... including the employee's partition containing private, irreplaceable, images... is the Company actually liable for damages when the employee claims the policy was vague and the employee lacked the understanding that personal information was at risk ?

    I'm looking for sample policies and agreements to create the best of class documents for General Counsels to use to customize to each enterprise.

    Can anyone help ?

Your group posting status

Your posts across groups are being moderated temporarily because one of your recent contributions was marked as spam or flagged for not being relevant. Learn more.

Feedback