Bring Your Own Device is the craze that has swept the enterprise and all but revolutionized the way the corporate world views product purchases. Gone are the days when CIOs and their buyers decided which products employees will use and workers are expected to listen. Nowadays, the enterprise is all about choice and allowing employees to have some options about the devices they use to perform their work. It's a seismic shift that cannot be overlooked, but it also introduces new security vulnerabilities.
Realizing that, Cisco partner Axispoint recently conducted a survey of 1,000 consumersabout their mobility habits and BYOD policies in the enterprise. The findings were eye-opening, to say the least, and make apparent beyond a reasonable shadow of doubt that the rules of hardware have changed in the enterprise. And the time has come for all companies and CIOs to accept that—and be aware of the potential security risks.
"Millions of American workers are setting up the office wherever and whenever they can find an Internet connection," Axispoint noted in its study. "And with access to an ever-widening range of devices—smartphones, tablets and laptops—workers aren't limiting themselves to company-provided hardware."
The following 10 slides make it abundantly clear that BYOD isn't just here to stay; it's here to change the enterprise. However, most employees aren’t very security-conscious about password-protecting their smartphones or using only secure wireless networks.
What About Secure Networks? Network security is even more worrisome: 52% of respondents say they have used their personal devices to access work-related information via unsecured Wi-Fi networks.
This article was originally published on 03-27-2013
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...