Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Tech Trends
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Who Is Responsible for BYOD Security?
Who Is Responsible for BYOD Security?

By Jennifer LeClaire
September 5, 2012 4:39PM

Bookmark and Share
According to the survey, organizations are split on who takes responsibility for the security of BYOD devices. Some 37 percent of respondents indicated the corporation was responsible for BYOD; 39 percent said the end users were responsible; 21 percent said both bear equal responsibility, and the remaining 3 percent were "unsure."
 


"Bring your own device." It's perhaps the biggest trend in corporate computing usage in the past 18 months. But yet another study is showing that BYOD security is sorely lacking.

A new study from KnowBe4 and Information Technology Intelligence Consulting shows that 71 percent of businesses that allow BYOD have no specific policies and procedures in place to support BYOD deployment and ensure security.

Considering that nearly two-thirds of businesses surveyed have adopted the BYOD trend and allow employees to use their mobile devices as a corporate desktop to access organizational data, that's a potentially dangerous problem.

"Mobile devices are the new target-rich environment," said Kevin Mitnick, former "most wanted" hacker and KnowBe4's chief hacking officer. "Based on lessons learned in the early days of the personal computer, businesses should make it a top priority to proactively address mobile security so they avoid same mistakes [of the PC era] that resulted in untold system downtime and billions of dollars in economic loss."

The Scary (Unsecure) Numbers

According to the survey, organizations are split on who takes responsibility for the security of BYOD devices. Some 37 percent of respondents indicated the corporation was responsible; 39 percent said the end users were responsible; 21 percent said both bear equal responsibility, and the remaining 3 percent were "unsure."

Presently, 51 percent of workers use smartphones as their BYOD devices; another 44 percent use notebooks and Ultrabooks, while 31 percent of respondents indicated they use tablets -- most notably the Apple iPad -- and 23 percent use home-based desktop PCs or Macs.

A 57 percent majority of respondents said they purchased/owned the devices they used for work; compared with only 19 percent that indicated the company buys and owns them. And the top three challenges with respect to BYOD deployment were: difficulty of management and support (63 percent); provisioning new applications (59 percent) and security (48 percent).

Wake Up!

Despite the growing body of evidence that suggests BYOD security is compromising the enterprise, ITIC principal analyst Laura DiDio told us BYOD is here to stay -- and its usage is expanding quickly because the five-day workweek is a thing of the past.

"The survey findings should act as a wake-up call to galvanize corporations into proactively managing and securing corporate data accessed by mobile BYOD devices before they suffer an expensive and potentially crippling loss or hack," DiDio said.

As she sees it, every firm and academic institution -- regardless of size or vertical market -- should conduct a risk assessment review and adopt strong security and management policies to deal with increasingly mobile BYOD deployments.

DiDio recommends businesses and academic institutions create a strong first layer of a "defense-in-depth" strategy that incorporates security policies, procedures, and security awareness training to deal with the potential risks and ramifications of BYOD deployments.

"Security awareness training should be an integral part of a BYOD deployment, just as Human Resources departments require sexual harassment training," DiDio said. "The 'defense-in-depth' strategy's security awareness training is an important element in BYOD deployments. This type of training ensures employees and students will fully comprehend the mechanisms of spam, phishing, spear-phishing, malware and social engineering, and are able to apply this knowledge to the personal devices used for and at the workplace."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Tech Trends
1.   Schools Buy Million Chromebooks in Q2
2.   Teaming Up: CIOs, IT Asset Managers
3.   NY Proposes Virtual Currency Rules
4.   Bitcoin 'Mining Pool' To Stay Small
5.   E-Commerce Warehouse Demand Up


advertisement
NY Proposes Virtual Currency Rules
But are separate regulations warranted?
Average Rating:
E-Commerce Warehouse Demand Up
As online shopping continues to grow.
Average Rating:
Aereo Presses Case Despite Setback
Wants to be treated as a cable company.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 
New Web Tracking Technologies Defeat Privacy Protections
Recently developed Web tracking tools are able to circumvent even the best privacy defenses, according to a new study by researchers at Princeton and the University of Leuven in Belgium.
 
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 

Enterprise Hardware Spotlight
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.