BYOD Is On the Rise, But Who's Watching the Store?

 
 
By Don Reisinger  |  Posted 01-09-2014 Email Print this article Print
 
 
 
 
 
 
 
 

The bring your own device (BYOD) phenomenon has swept the globe, according to new data from SailPoint, a security firm. In fact, the company's survey of 400 IT leaders in the U.S. and U.K. reveals that not only is BYOD being widely embraced by the corporate world, but many firms around the world are mandating that employees bring their own products into the office to accomplish their work. (To say that's a dramatic shift in the way businesses have operated in the last two decades is a huge understatement.) However, with such a drastic change comes numerous challenges. And in the case of BYOD, the biggest challenge for companies is trying to keep up with the changing times. "Many organizations are struggling to manage 'who has access to what?' across the enterprise," says SailPoint founder Jackie Gilbert. "And as our survey indicates, the growing adoption of cloud and mobile technologies is making the problem significantly worse. It's pretty clear that if you're not proactively managing cloud and mobile access today, you're at increased risk of fraud, data theft and security breaches." Just how far behind the enterprise is when it comes to handling BYOD-related security issues might just surprise you.

 
 
 
  • Say Hello to the Cloud

    The cloud is becoming all pervasive. In fact, 84% of companies surveyed by SailPoint are employed cloud-based applications in their offices.
    Say Hello to the Cloud
  • BYOD Is Close Behind

    Don't think BYOD is huge? Think again: 82% of companies let their employees use personal devices in the office.
    BYOD Is Close Behind
  • Back to the Cloud (And Work)

    Cloud applications are so important to businesses today that 63% of companies require IT decision-makers to evaluate Web-based apps before choosing software.
    Back to the Cloud (And Work)
  • Management Is a Conundrum

    Although the cloud looks appealing at first blush, 41% of companies say they can't effectively manage identities and access management via the cloud.
    Management Is a Conundrum
  • A Lack of Data Protection

    Only 41% of companies have a process by which they remove mission-critical data from employee mobile devices in the event of a firing or resignation.
    A Lack of Data Protection
  • In Search of Sensitive Data

    Even when BYOD isn't an issue, 57% of companies say they've lost company-owned devices containing sensitive information.
    In Search of Sensitive Data
  • The Great Sharing Problem

    Here's a biggie: 81% of companies believe employees are sharing passwords to gain access to cloud and corporate apps containing sensitive data.
    The Great Sharing Problem
  • An Ex-Employee Is a Threat

    Just 54% of companies believe that they can revoke access to their entire IT infrastructure should an employee leave the company.
    An Ex-Employee Is a Threat
  • Left But Not Really Gone

    Over 50% of companies have witnessed fired employees attempt to access company data or applications after they have left the organization.
    Left But Not Really Gone
  • Time, Time, Time

    Scared yet? Just over half of companies—51%—say it's "just a matter of time" before another security breach occurs.
    Time, Time, Time
 
 
 
 
 
Don Reisinger is a freelance technology columnist. He started writing about technology for Ziff-Davis' Gearlog.com. Since then, he has written extremely popular columns for CNET.com, Computerworld, InformationWeek, and others. He has appeared numerous times on national television to share his expertise with viewers. You can follow his every move at http://twitter.com/donreisinger.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date