BYOD Passwords Hacking Cloud Compliance Reviews Privacy

Current Filter: Security>>>>>Feature>

PREVIOUS

Filtered Articles:1 of 99   Current Article ID:6651

NEXT



After the flood

Editorial Type: Industry Focus     Date: 05-2016    Views: 4204      












With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital

As employees connect their own vast mix of mobile devices to the enterprise, security has become increasingly important and complex. What strategies should you introduce to reduce risk? How do you ensure you're always in control of these devices, rather than the other way round?

Following industry predictions that the global BYOD and enterprise mobility market will reach $360 billion by 2020, Crowd Research Partners has released the results of its new 2016 BYOD and Mobile Security Report, in conjunction with leading data security vendors Bitglass, Blancco Technology Group, Check Point Software Technologies, Skycure, SnoopWall and Tenable Network Security. Based on a survey of over 800 global cybersecurity professionals who are members of the 300,000 member Information Security Community on LinkedIn, the study provides a conflicting portrayal of BYOD security barriers and adoption trends in the workplace.

"Increased productivity and employee satisfaction continue to drive adoption of BYOD and enterprise mobility", says Holger Schulze, founder of the LinkedIn community. "The 2016 BYOD and Mobile Security report reveals that enterprise security risks and mobile data breaches are on the rise. While these threats can significantly impact the success of BYOD initiatives and place a burden on IT support staff, this is also an opportunity for organisations to implement effective cybersecurity solutions to strengthen their security posture and capitalise on the promise of enterprise mobility."

Key BYOD and mobile security trends that surfaced from the study include:

• Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. In contrast, management opposition (3%) and user experience concerns (4%) rank far lower
• One in five organisations suffered a mobile security breach, primarily driven by malware and malicious WiFi
• Security threats to BYOD impose heavy burdens on organisations' IT resources (35%) and help desk workloads (27%).

Despite increasing mobile security threats, data breaches and new regulations, only 30% of organisations are increasing security budgets for BYOD in the next 12 months. Meanwhile, 37% have no plans to change their security budgets.

Nat Kausik, CEO, Bitglass, comments: "The threat of data leakage is more prevalent than ever, as employees look to access sensitive corporate information on mobile devices outside the corporate network. Unfortunately, few organisations have adequate risk control measures in place. Less than half support critical capabilities, like device encryption and DLP - a gap that suggests more comprehensive BYOD security solutions are needed."

TOUGH NUT TO CRACK
Pat Clawson, CEO, Blancco Technology Group, concedes that BYOD can be a tough nut for organisations to crack. "Despite its many benefits, our study found that 21% of organisations have experienced a data breach resulting from BYOD or corporate-owned mobile devices. This often creates a chicken-or-egg scenario - where organisations contemplate whether to push forward with BYOD without having complete security controls in place or to postpone until they can be absolutely certain data won't be leaked. To change this, we need to educate businesses on the full scope of mobile security risks and technology solutions that can help them protect data across the entire lifecycle - and get the C-suite to understand the impact on overall business growth."

Michael Shaulov, head of mobility product management, Check Point Software Technologies, agrees that keeping pace with the unknown risks that a BYOD strategy brings to the corporate environment is a struggle for most organisations. "Overburdened IT staff need comprehensive and automatic threat defence that protects mobile devices and data, but also respects employee concerns over the privacy of their personal information."

Meanwhile, Gavin Millard, technical director, EMEA, Tenable Network Security, had this to say: "Mobile device security has become one of the biggest challenges facing the modern enterprise. As attackers continue to become more persistent and sophisticated, organisations need a real-time view of their security posture that identifies gaps in coverage and reduces the risk of a breach."

EXPLOSIVE GROWTH
With the explosive growth of mobile applications in different areas, whether consumer or enterprise mobility, the need for strong security is clearly highly critical. "Mobile data security, in particular, needs to protect sensitive cardholder information, as well as Personally Identifiable Information (PII) and Protected Health Information (PHI) in mobile applications," says Smrithi Konanur, Global Product Management, HPE Data Security - Payments, Web and Mobile. "The need to safeguard sensitive data in mobile environments throughout the data lifecycle, at rest, in motion and in use, becomes critical to ensure end-to-end data protection."



Page   1  2  3

Like this article? Click here to get the Newsletter and Magazine Free!

Email The Editor!         OR         Forward ArticleGo Top


PREVIOUS

                    


NEXT