A new survey from network security specialist Fortinet has reiterated the potential security risks to corporate IT networks from the bring-your-own-device (BYOD) trend, which is gaining increasing traction in the workplace.
The poll, conducted in 15 territories during May and June 2012, asked more 3,800 active employees in their 20s about their perspectives on BYOD, its impact on their work environment and their approach to personal and corporate IT security, and found one in three respondents said they would contravene a company’s security policy that forbids them to use their personal devices at work or for work purposes.
Survey results indicted the primary driver of the BYOD practice is that individuals can constantly access their preferred applications, especially social media and private communications, and this next generation of decision makers and managers is increasingly viewing the use of personal devices in the workplace as a right, rather than a privilege.
Nearly three-quarters (74 percent) of respondents across all territories already regularly engage in the practice, the study found.
When it comes to policies banning the use of non-approved applications, 30 percent said they would also contravene policy to use them, and 69 percent of respondents confirmed they are interested in “bring your own application” (BYOA), where users create and use their own custom applications at work. While this indicates other areas where organisations are at risk, two-thirds (66 percent) of respondents consider themselves – not the company – to be responsible for the security of the personal devices they use for work purposes.
“The survey clearly reveals the great challenge faced by organisations to reconcile security and BYOD,” Patrice Perche, vice president of international sales and support for Fortinet, said in a prepared statement.
“While users want and expect to use their own devices for work, mostly for personal convenience, they do not want to hand over responsibility for security on their own devices to the organisation,” it said.
“Within such an environment, organisations must regain control of their IT infrastructure by strongly securing both inbound and outbound access to the corporate network and not just implement mobile-device management, or MDM. Organisations cannot rely on a single technology to address the security challenges of BYOD. The most effective network security strategy requires granular control over users and applications, not just devices,” Perche continued.
How much do you know about smartphones? Take our quiz.
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…
View Comments
This does not surprise me, BYOD schemes could quickly become one of the main sources of security breaches due to unsecured devices especially smartphones.
It isn't all bad, if you can manage to deal with the security issues a BYOD scheme can bring a lot of benefits.
Check out this article http://blog.insight.com/2012/04/byod-persuading-workers-to-towe-the-line/ it goes into this topic in more detail