NaviSite named SVC 2014 Cloud Company of the Yea... » NaviSite takes home the top prize for its work with PMGC Technology Group Ltd. to deliver enterprise... Zylpha adopts Adobe EchoSign as E-Signature Soluti... » Zylpha has adopted Adobe EchoSign, an e-signature solution, that will allow Zylpha customers to incr... €1bn CONTRACT TO DEVELOP CUTTING EDGE RADAR FOR ... » A €1bn (approximately £800m) contract for the development of a new electronic radar system for the E... Game-changing threat intelligence service combin... » London: Complete cybersecurity service provider, SecureData has today launched SecureData GI (Greate... New cellular certification adds to Opengear’s out-... » Sandy, UT: Opengear has announced the addition of the ACM5504-5-GS-I and the ACM5508-2-GS-I remote m... Zertificon's decade of success » Berlin: On its 10th anniversary, IT-Security specialist Zertificon looks back on a successful decade... KREA enhances network capabilities with Claviste... » KREA, Turkey’s largest e-mail marketing company, has enhanced its network capabilities following a d... Patch Tuesday: Adobe update » Yesterday Adobe published the second update (APSB14-26) of Adobe Flash this month, an out of band re... Templar Executives awarded CESG certification fo... » Cyber security specialist Templar Executives has become one of the first organisations to gain accre... NBCS supports calls for collaboration in fight aga... » “We couldn’t agree more with the recent comments made by Georgina Barnard, TP Crime Reduction & Part...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

As enhanced efficiency, employee productivity and the reduced burden on IT teams continue to drive adoption of Bring Your Own Device (BYOD), a recent survey of more than 500 IT decision makers, conducted by Zenprise – the recognised leader and innovator in mobile device management (MDM) – suggests that UK firms are leaving themselves dangerously exposed to security risks, as only a handful of organisations are implementing formal policies that govern the use of personal devices in the workplace.

The security implications of enabling access to corporate networks and resources from personal devices are significant, and without careful management, could lead to the malicious or accidental leakage of sensitive corporate data. Despite these risks, 39% of respondents stated employees are permitted to use devices for both personal and corporate use, while only 8% have a formal BYOD policy in place.

Even when BYOD policies are in place, businesses are not always convinced these procedures offer adequate protection against breaches, with only 31% of respondents with a policy stating they had no concerns about security. Of everyone surveyed, only 7% said their company was able to lock down app usage, while just 5% have the means to track devices by GPS. These results point to a worrying level of complacency among organisations with regards to secure enterprise mobile device management.

Matt Peachey, VP and GM, EMEA at Zenprise has made the following comments:

“The fact that enterprises are rushing to implement BYOD initiatives is no surprise, thanks to the convenience and ever-growing popularity of mobile devices. However, the security risks posed by this new level of mobility are clearly being overlooked by businesses, and with data breach incidents continuing to rise, it is an issue which simply cannot be ignored.

“With so much to gain from effective BYOD initiatives – which, when done right, can deliver many measurable business benefits as well as supporting growth and innovation – organisations cannot afford to cuts any corners when it comes to security. Comprehensive security processes should be absolutely top-of-the-agenda for any firm looking to enable BYOD, and businesses would be wise to take a holistic approach which focuses on securing data and applications in use, as well as on the mobile devices connecting to the network. With the best available tools in place, incidents such as the loss of an executive’s tablet can be easily mitigated by instantly wiping it clean, reducing the headache for IT and preventing the potential fall-out from a breach of corporate data.

“With all this in mind, it really is vital that organisations urgently re-address the security of enterprise mobility. Indeed, with so much at stake, this must become a top priority for modern businesses as we move into 2013.”