Security is Imperative for BYOD, Mobile Deployments
Nearly two-thirds of businesses – 62% — now allow their end users to “bring their own devices (BYOD)” and use them as their corporate desktops or mobile devices to access organizational data including Email, applications and sensitive data. However, 71% of businesses that allow BYOD, have no specific policies and procedures in place to support BYOD deployment and ensure security.
That’s according to the latest independent joint survey conducted by ITIC and KnowBe4.com, a Clearwater, Florida company that specializes in security awareness training. The ITIC/KnowBe4.com survey, polled 550 companies worldwide in July and August. The survey survey found that only 13% of respondents said their firms have specific policies in place to deal with BYOD deployments, while another nine percent indicated they were in the process of developing BYOD procedures.
“These survey findings should act as a wake-up call to galvanize corporations into proactively managing and securing corporate data accessed by mobile BYOD devices before they suffer an expensive and potentially crippling loss or hack,” said ITIC principal analyst Laura DiDio. She continued, “Every firm regardless of size should conduct a risk assessment review and adopt strong security and management policies to deal with increasingly mobile BYOD deployments.” …
Security is Imperative for BYOD, Mobile DeploymentsRead More »
Security is Imperative for BYOD, Mobile Deployments Read More »