Previous Page  48 / 96 Next Page
Information
Show Menu
Previous Page 48 / 96 Next Page
Page Background

unauthorized access to corporate data

and systems (56 percent).

Allowing employees to use their

own devices for work purposes has

many benefits but also introduces

security risks. Many of these risks are

similar to those experienced when

securing PCs and laptops, but quickly

become compounded due to the fact

that BYOD devices, which are always

connected to the Internet, are primar-

ily consumer grade and are updated

or replaced far more frequently.

Mobile devices also comingle

personal and business applications,

presenting additional challenges with

respect to securing and managing

these devices versus corporate

PCs and laptops.

There’s also the issue of the “roll

the dice” attitude that workers have

with BYOD devices. A separate sur-

vey from Symantec found that nearly

three in four (72 percent) of British

workers use their own personal device

for work, whether it’s a smartphone,

tablet, laptop or home PC. But just

15 percent of them make sure the

security settings on their devices are

automatically updated, meaning the

vast majority (85 percent) have to do

this manually. There’s no guarantee

that these workers will have the latest

security on their device. In fact, 13

percent have no idea what the securi-

ty status of their device is. Only about

half (54 percent) were able to confirm

that security on the device was up-to-

date at all times.

Personal devices connected to

corporate networks can spread vi-

ruses and other malware, which can

have a direct route onto the corpo-

rate network.

Over half (53 percent) of all those

surveyed said they use their personal

devices for work when outside the

workplace. The hours immediately be-

fore and after work are the most vul-

nerable for businesses – that’s when

57 percent of workers confessed to

using their personal device for work.

These challenges highlight the

need for holistic, integrated solutions

that can apply and enforce consistent

security policies across all network

endpoints, whether they are PCs, lap-

tops or mobile devices.

Enterprises’ Main BYOD

Security Concerns

Data leakage/loss

65%

Lost or stolen devices

61%

Users download unsafe apps/content

59%

Unauthorized access to company data/systems

56%

Malware

56%

Vulnerability exploits

50%

Inability to control endpoint security

47%

Ensuring security software is up to date

40%

Source: Check Point Technologies

Cyber Patrol

Channel

Vision

|

March - April, 2017

48