A new survey from network security specialist Fortinet has reiterated the potential security risks to corporate IT networks from the bring-your-own-device (BYOD) trend, which is gaining increasing traction in the workplace.
The poll, conducted in 15 territories during May and June 2012, asked more 3,800 active employees in their 20s about their perspectives on BYOD, its impact on their work environment and their approach to personal and corporate IT security, and found one in three respondents said they would contravene a company’s security policy that forbids them to use their personal devices at work or for work purposes.
Survey results indicted the primary driver of the BYOD practice is that individuals can constantly access their preferred applications, especially social media and private communications, and this next generation of decision makers and managers is increasingly viewing the use of personal devices in the workplace as a right, rather than a privilege.
Nearly three-quarters (74 percent) of respondents across all territories already regularly engage in the practice, the study found.
When it comes to policies banning the use of non-approved applications, 30 percent said they would also contravene policy to use them, and 69 percent of respondents confirmed they are interested in “bring your own application” (BYOA), where users create and use their own custom applications at work. While this indicates other areas where organisations are at risk, two-thirds (66 percent) of respondents consider themselves – not the company – to be responsible for the security of the personal devices they use for work purposes.
“The survey clearly reveals the great challenge faced by organisations to reconcile security and BYOD,” Patrice Perche, vice president of international sales and support for Fortinet, said in a prepared statement.
“While users want and expect to use their own devices for work, mostly for personal convenience, they do not want to hand over responsibility for security on their own devices to the organisation,” it said.
“Within such an environment, organisations must regain control of their IT infrastructure by strongly securing both inbound and outbound access to the corporate network and not just implement mobile-device management, or MDM. Organisations cannot rely on a single technology to address the security challenges of BYOD. The most effective network security strategy requires granular control over users and applications, not just devices,” Perche continued.
How much do you know about smartphones? Take our quiz.
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…
View Comments
This does not surprise me, BYOD schemes could quickly become one of the main sources of security breaches due to unsecured devices especially smartphones.
It isn't all bad, if you can manage to deal with the security issues a BYOD scheme can bring a lot of benefits.
Check out this article http://blog.insight.com/2012/04/byod-persuading-workers-to-towe-the-line/ it goes into this topic in more detail