Renegade Users

The "consumerization" of IT remains a hot topic for technology executives, with the growing popularity of products such as the Apple iPad and social networking sites such as Facebook and Twitter. So how secure are these consumer-focused technologies that are increasingly pushing their way into the work environment, and what impact are they having on corporate compliance efforts? Proofpoint Inc., a provider of cloud-based email security offerings, and research firm Osterman Research, conducted an online survey of 632 IT and security professionals from U.S. businesses and government agencies in May 2011 to find out. The results are featured in the "2011 Consumerized IT Security Survey," released on June 23. According to the report, this is an issue many organizations need to think about: more than 80 percent of those surveyed are letting their employees use consumerized IT products and services to conduct business communications. "Consumerized IT in the workplace is a fact of life, and organizations recognize that they must act to integrate it in a secure and compliant manner," says Michael Osterman, principal of Osterman Research.


16% of respondents say their organizations do not allow employees to use consumer technology in the workplace. Of this segment, 64% suspect that employees are using consumerized IT regardless of policies against it, and 56% say their company either has no consumer IT adoption strategy in place or they don't know if their company has a plan.

This article was originally published on 06-23-2011
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.