Are You Exposing Critical Data?
March 25, 2014
The bring-your-own device (BYOD) phenomenon continues to become more commonplace as Gartner predicts that half of employers will require their employees to supply their own devices by 2017. This is clear evidence that BYOD is rapidly becoming embedded in employees’ working life, which also spells out a nightmare for security officers and IT staff.
Unlike company-issued devices, personally owned devices do not come enabled with equipment device management features. Consumerization is now being pursued in an attempt to increase productivity and reduce costs. As a result, compliance with previously existing IT policies may not always be a top priority.
Security in the enterprise environment is thus constantly changing due to consumerization. Security remains one of the biggest challenges in BYOD-enabled workplaces.
A Gartner study on BYOD reports that over 60% of employees use a personal device for work. This suggests that the BYOD phenomenon isn’t merely a trend, but a reality that will not only linger but grow.
Read more to prepare for the BYOD era.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Exposed Container Registries: A Potential Vector for Supply-Chain Attacks
- LockBit, BlackCat, and Clop Prevail as Top RAAS Groups: Ransomware in 1H 2023
- Diving Deep Into Quantum Computing: Modern Cryptography
- Uncovering Silent Threats in Azure Machine Learning Service: Part 2
- The Linux Threat Landscape Report