Trustlook Insights Q BYOD Trends & Practices

Similar documents
Bring your own device: a major security concern

As Enterprise Mobility Usage Escalates, So Does Security Risk

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

2018 Mobile Security Report

Mobile Device Management: A Real Need for the Mobile World

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION

Mobile Device Management: Strategies for Success. Speaker: Keith Leone

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Enterprise Mobility Management: completing the EMM story

2016 Survey: A Pulse on Mobility in Healthcare

Bring Your Own Device (BYOD)

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Steps to Eradicate Text Messaging Risk

Enterprise Mobility Management: Why Size Doesn t Matter

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All?

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

A Global Look at IT Audit Best Practices

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Modern Database Architectures Demand Modern Data Security Measures

CLOSING IN FEDERAL ENDPOINT SECURITY

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

Good Technology State of BYOD Report

Security Solutions for Mobile Users in the Workplace

IT Security: Managing a New Reality

Sales Presentation Case 2018 Dell EMC

Psychology of Passwords: Neglect is Helping Hackers Win

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Securing Health Data in a BYOD World

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

Enterprise Mobility. BEYOND MDM: A MULTIDIMENSIONAL MOBILITY STRATEGY Why device-centric strategies no longer meet today s mobility needs

BIG IDEAS FOR SmAll BuSInESS:

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

What BYOD and CYOD mean for workplace transformation

BYOD: Focus on User Experience, Not the Device

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Apple Device Management

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE CYBERSECURITY LITERACY CONFIDENCE GAP

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

STUDY REVEALS GROWING DEMAND FOR HIGH-SPEED DATA COMMUNICATIONS

THALES DATA THREAT REPORT

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

HOW TO MINIMIZE BYOA RISKS WHEN ROLLING OUT YOUR BYOD POLICY

Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis

6 Ways Office 365 Keeps Your and Business Secure

Securing Institutional Data in a Mobile World

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Taking Care. of B usiness. Why the time is now to give your employees the mobile devices they really want. And why the right partner matters.

Mobile Security Trends in the Workplace

US 2013 Consumer Data Privacy Study Mobile Edition

BRING YOUR OWN DEVICE (BYOD)

BYOD: A Global Perspective

The 11-point checklist for SMB Microsoft Azure Cloud users

Securing Corporate Data on Mobile Devices

U.S. State of Cybercrime

Outsourcing & remote teams: cyber security vulnerabilities

The CIO s BYOD Toolbox: Top Trends for HIPAA Compliant mhealth

Welcome! Ready To Secure Access to Your Microsoft Applications?

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

The Dropbox Problem: It s Worse than You Think

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

The data quality trends report

Managing BYOD Networks

Operationalize Security To Secure Your Data Perimeter

ForeScout ControlFabric TM Architecture

Make security part of your client systems refresh

State of SMB IT 1H 2012

Protecting Health Information

The Future of Mobile Device Management

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

SECOND ANNUAL. Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

Food Handler s Training and Certification Catalog

The State of the American Traveler TM

Five Tips to Mastering Enterprise Mobility

10 Hidden IT Risks That Might Threaten Your Business

A Guide to Closing All Potential VDI Security Gaps

MOBILE DEVICE MANAGEMENT OR PRETTY MUCH EVERYTHING YOU NEED TO KNOW ABOUT MOBILE DEVICES IN THE WORKPLACE!

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

A Practical Guide to Efficient Security Response

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3%

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience

BYOD Secure Zoning Between Enterprise and Personal Data on Mobile Devices. 14 November 2013 Rozana Rusli Meling Mudin

WELCOME TO MYTOMCHAT.COM. World-Mobile Solutions Ltd, UK

Cyber Security. June 2015

MaaS360 Unified Mobility Management

Get Smart about Backup & Recovery

RISE OF THE MACHINES. European research into mobile workforce preferences

Mobile Security using IBM Endpoint Manager Mobile Device Management

Why Enterprises Need to Optimize Their Data Centers

Mobile App Security and Malware in Mobile Platform

2012 PUBLIC SAFETY INDUSTRY STUDY THE CHANGING REQUIREMENTS OF COMMUNICATIONS TECHNOLOGY FOR PUBLIC SAFETY

Transcription:

Trustlook Insights Q4 2016 BYOD Trends & Practices

Overview BYOD is the practice of allowing employees to use personal devices at work. It gives employees freedom over where (and how) they work, and allows companies to spend less in operating expenses. Despite its rising popularity, many employers are still on the fence. If not fully understood and regulated, BYOD can threaten IT security and put a company's sensitive business systems at risk. This report is the result of a survey of 320 Trustlook Mobile Security users. The goal of the survey was to understand current BYOD trends and practices within organizations. Some findings validated existing beliefs, while others were truly fascinating in terms of how BYOD is treated and understood at organizations. We hope you enjoy the findings.

Key Survey Findings 1. Even though 70% of employees use a personal device for work, only 39% of companies have a formal BYOD policy 2. More than 50% of respondents have never received instructions for using a personal device at work 3. More than 75% of respondents are not familiar with the MDM (Mobile Device Management) solution of their employer 4. Only 14% of employers have a preferred mobile security app for their employees to use

Survey Questions

Personal Device Usage More and more workers are using their personal devices -- laptops, phones, and tablets -- at work. This generally leads to greater productivity, but can pose a security risk. 70% use a personal device for work Q. Does your employer allow you to use your personal mobile device for work related tasks?

BYOD Policy Even though BYOD (Bring Your Own Device) is growing, many employers still lack a formal policy governing how their employees should use this capability. This increases the chance of a security breach. Only 39% of employers have a BYOD policy Q. Does your company have a formal BYOD policy?

BYOD Instructions More than half of employees surveyed have received no training for using their personal mobile device at work. Instructions could include how to connect to an MDM, installing an antivirus, and rules governing which information should and should not be shared. 51% have received no training Q. Have you received instructions on using your personal device for work related matters?

Exposing Company Info Nearly half of employees are concerned with exposing private company information while using a personal device at work. This fear, along with the lack of a formal BYOD policy at many organizations, can pose a security risk. 49% are concerned with exposing info Q. Are you concerned with exposing confidential company information on your personal mobile device?

Mobile Security App Most companies do not have a preferred mobile security app for their employees to install. These companies are either not concerned with mobile security, or leave it up to the employee to install the needed protection on their device. Only 14% have a preferred security app Q. Does your company have a preferred mobile security app that it would like for you to install on your personal device?

Mobile Device Management MDM is a way to ensure employees stay productive and do not breach corporate security policies. Most employees are unaware of the MDM solution their company uses. Many employees are not sure if their company even uses an MDM solution. 46% unsure of MDM solution Q. Which MDM (Mobile Device Management) solution does your employer use?

Provided Mobile Device Most companies do not provide their employees with a mobile device for use at work, leading to the inevitability that the employees will use their personal device for work related tasks. This may lead to greater productivity, but could also pose a security threat. 80% are not provided with a device Q. Does your company provide you with a mobile device (phone or tablet) for work related tasks?

Notable Comments There aren t any instructions in place on BYOD here at my company. I use my device for work without any restrictions. The employer is cool with it. I have a concern over BYOD and the device being managed by my company. I worry my personal information is being accessed by the admin. BYOD is good both for employer and employee. It makes you feel much more comfortable at work.

Contact Us Interested in learning about other Trustlook research or Insights reports? Contact Joe Sullivan to learn more. jsullivan@trustlook.com