sb-nz logo
Story image

Businesses failing to secure BYOD - Bitglass

03 May 2019

Organisations are enabling bring your own device (BYOD) without putting proper security tools, training, and best practices in place, research has found.

According to Bitglass’ survey, most businesses are embracing BYOD in the workplace – 74% of respondents said that employees at their companies are allowed to use personal devices to perform their work.

However, nearly half of respondents (47%) either said that their employer did not have a clear BYOD security policy, or that they did not know if such a policy was in place at all.

Respondents considered unmanaged devices (31%) to be the top blind spot for data leakage; additionally, mobile devices (which are typically unmanaged) were the third largest blind spot at 18%.

Despite this, less than a fifth of respondents (16%) cited unmanaged devices as a top security priority for their organisations this year.

“Embracing BYOD can yield benefits like increased productivity, cost savings, and talent retention,” says Bitglass Regional Director Steve Armstrong.

“However, allowing employees to perform their work from personal devices can lead to data leakage if proper BYOD policies and security solutions are not put in place.”

“In order to securely reap the benefits of BYOD, organisations need advanced tools such as user and entity behaviour analytics (UEBA) and data loss prevention (DLP).

“Additionally, they must be able to selectively wipe corporate data from personal devices without affecting the personal data therein,” he adds.

“However, for deployments to be successful, these capabilities need to be implemented through an agentless solution that won’t hinder user privacy or device functionality.”  

Key Findings:

  • Respondents stated that their organisations’ top overall security priorities for the year were malware protection (26%), unmanaged device access (16%), consolidating security solutions (16%), controlling external sharing (14%), improved analytics (11%), and unmanaged applications (9%).
     
  • When asked for the tools that they saw as the least effective for securing personal devices, respondents identified password-protected documents as the frontrunner (36%), and face recognition (20%) as the second least effective.
     
  • For multifactor authentication on BYO devices, 37% of organisations use third-party applications, 13% use SMS tokens, 11% use hardware tokens, and 11% use Google Authenticator; 28% of respondents stated that their organisations do not use MFA on personal endpoints.
Story image
Data leakage concerns dominate cloud security perceptions - Bitglass report
How secure is the public cloud? That’s what many IT and security professionals are asking as data leakage becomes a pressing concern for organisations and their data protection strategies.More
Story image
The retailer safety guide for the world of online shopping
Are you an online retailer? This guide details the threats that you need to be aware of to keep safe in the biggest ever year of online shopping.More
Story image
CyberArk launches Forescout and Phosphorus integration to aid with IoT security
“Through our integration with Forescout and Phosphorus, CyberArk dramatically improves security and compliance, and alleviates the burden on IT and security teams."More
Story image
Rising threat of data breaches among enterprises drives growth in network security revenue
"Key factors leading to the growth of network security market revenue in the Asia Pacific region includes instances of ransomware attacks, targeted attacks and phishing."More
Story image
NetMotion announces SASE platform leveraging Microsoft Azure
The platform offers integrated transport and web proxies, distributed firewalls, network access control (NAC), zero trust network access (ZTNA) or software-defined perimeters (SDP), a VPN highly optimised for mobile access, and AI-driven policy and risk analysis.More
Story image
IDC names ESET a Major Player second year running
“ESET is strong in the areas of threat research, especially around Android malware identification and behavior detection.”More