Story image

Unsecure Apple devices a 'huge' liability

01 Sep 15

A lack of security and management of Apple devices in the workplace is exposing businesses to significant liabilities, according to new research from cyberthreat firm Centrify.

Nearly half (45%) of workers surveyed use at least one Apple device for work purposes, the survey found. 

A majority of those Apple devices (63%) are owned by the user as opposed to the company and are used to access work email, corporate documents and business applications.

According to the research, 59% of Macs are used to access confidential company information, while 65% of Macs are used to access sensitive or regulated customer information.

The survey found 51% of iPhones in the workplace are used to gain access to business applications, and 58% of iPads in the workplace are used to gain access to business applications.

Despite the popularity of Apple devices in the workplace, Centrify says businesses do not invest enough resources to secure or manage them.

Over half (51%) of all devices are secured by a password that is merely a single word or a series of numbers, the research shows. Most devices (58%) also do not have software installed to enforce strong passwords.More than half (56%) of users report sharing their passwords with others.

Only 17% of Apple devices have a company-supplied password manager, and only 28% of Apple devices have company-provided device management solutions installed.

The research found only 35% of Apple devices have encryption of stored data enforced by their company.

“Centrify’s Apple survey spotlights the massive exposures that occur when devices do not comply with standard corporate security policies,” explains Bill Man, chief product officer, Centrify.

 “In particular, customer data represents a huge liability. Disclosure of regulated information such as healthcare records could expose corporations to fines and other legal action,” he says. 

“Most importantly, there are solutions on the market today that can handily secure Apple devices without sacrificing user productivity. It’s time for IT to take action.”

Centrify says ultimately there is no discernable correlation between password strength and sensitivity of information accessed or accessible from a particular device or user.

Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Kordia launches Women in Tech scholarship at the University of Waikato
The scholarship is established to acknowledge and support up-and-coming female talent and future technology leaders.