

unauthorized access to corporate data
and systems (56 percent).
Allowing employees to use their
own devices for work purposes has
many benefits but also introduces
security risks. Many of these risks are
similar to those experienced when
securing PCs and laptops, but quickly
become compounded due to the fact
that BYOD devices, which are always
connected to the Internet, are primar-
ily consumer grade and are updated
or replaced far more frequently.
Mobile devices also comingle
personal and business applications,
presenting additional challenges with
respect to securing and managing
these devices versus corporate
PCs and laptops.
There’s also the issue of the “roll
the dice” attitude that workers have
with BYOD devices. A separate sur-
vey from Symantec found that nearly
three in four (72 percent) of British
workers use their own personal device
for work, whether it’s a smartphone,
tablet, laptop or home PC. But just
15 percent of them make sure the
security settings on their devices are
automatically updated, meaning the
vast majority (85 percent) have to do
this manually. There’s no guarantee
that these workers will have the latest
security on their device. In fact, 13
percent have no idea what the securi-
ty status of their device is. Only about
half (54 percent) were able to confirm
that security on the device was up-to-
date at all times.
Personal devices connected to
corporate networks can spread vi-
ruses and other malware, which can
have a direct route onto the corpo-
rate network.
Over half (53 percent) of all those
surveyed said they use their personal
devices for work when outside the
workplace. The hours immediately be-
fore and after work are the most vul-
nerable for businesses – that’s when
57 percent of workers confessed to
using their personal device for work.
These challenges highlight the
need for holistic, integrated solutions
that can apply and enforce consistent
security policies across all network
endpoints, whether they are PCs, lap-
tops or mobile devices.
Enterprises’ Main BYOD
Security Concerns
Data leakage/loss
65%
Lost or stolen devices
61%
Users download unsafe apps/content
59%
Unauthorized access to company data/systems
56%
Malware
56%
Vulnerability exploits
50%
Inability to control endpoint security
47%
Ensuring security software is up to date
40%
Source: Check Point Technologies
Cyber Patrol
Channel
Vision
|
March - April, 2017
48