Security Market Segment LS
Wednesday, 25 March 2015 16:31

BYOD – Bring your own disaster

By

A new report by Flexera Software and IDC should have system administrators trembling.

When an Environmental Protection Agency (EPA) employee was playing the Kim Kardashian Hollywood game app on her mobile work phone, it tweeted out to the EPA’s 52,000 Twitter followers ‘I’m now a C-List celebrity in Kim Kardashian: Hollywood. Come join me….’

Threats to data and security are hidden in innocuous apps. One, a flashlight app illegally transmits a users precise location and data to advertisers, or common banking apps that are capable of capturing device logs, accessing contacts lists, reading SMS messages or even installing packages on the phone.

Welcome to the world of Bring your Own Device where apps can infect the enterprise.

The report (free login required) finds that most organisations are not taking action to block risky app behaviours and don’t realise the significant risk from BYOD policies. This infographic covers most points.

  • Enterprises are broadly adopting BYOD policies: 48 percent of enterprises have already or are in the process of implementing BYOD policies, and another 23 percent plan on doing so within two years
  • Data security is a pervasive challenge: 71 percent of enterprises said data security counts among their biggest challenges when implementing BYOD policies
  • Blocking risky apps is a priority: 47 percent of respondents say they’re instituting policies that block risky app behaviours to mitigate mobile app security risks. Another 22 percent plan on doing so within two years
  • Enterprises are failing to identify risky app behaviours: Despite concerns about security and blocking risky apps, most organisations – 61 percent – have not even identified which app behaviours they deem risky (i.e. Ability to access social media apps like Twitter, apps that report back user data to app producer, etc.)
  • Enterprises are also failing to identify apps deemed risky:  A majority of organisations – 55 percent – have not identified specific mobile apps that exhibit risky behaviors that would violate their BYOD policies
  • BYOD policies are not reducing enterprises’ security risks: Only 16 percent of respondents report that their BYOD policies are resulting in lower enterprise application risk

Note that Flexera Software helps application producers and enterprises increase application usage and the value they derive from their software.  Its software licensing, compliance and installation solutions are essential to ensure continuous licensing compliance, optimised software investments and to future-proof businesses against the risks and costs of constantly changing technology.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Ray Shaw

joomla stats

Ray Shaw [email protected]  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments