Menu
Corporates struggle to secure employee mobile devices

Corporates struggle to secure employee mobile devices

Risks understood but solutions thin on the ground, Check Point finds

The number of employee-owned mobile devices used on corporate networks continues its inexorable rise despite yawning and known gaps in security, a Check Point survey has found.

The questioning of 768 IT executives in the US, UK, Canada, Germany and Japan for The Impact of Mobile Devices on Information Security found that two thirds allow the use of personal mobile devices while at work, a marked increase on two years ago.

Complimenting this is a small army of conventionally-managed mobile smartphones and tablets supplied by companies themselves, with the most popular being the ubiquitous Apple iPhone and only slightly less popular BlackBerry.

The security risk inherent in all this comes across in the 71 percent who believe mobile devices have increased security incidents over the last two years with 43 percent naming Android as posing the greatest worry.

Apple was only slightly better regarded with 36 percent seeing it as a risk, all of which underlines that data security anxiety often transcends platform; half of respondents said customer data was stored on mobile devices with staff carelessness rather than hacking or malware posing the biggest risk to its security.

What is clear is that personal mobile devices outnumber managed ones by nearly three to one on some networks, which begs the question of how a company can secure so many devices that don't belong to them.

Added to the fact that few personal mobile devices use encryption, there is plenty of evidence that smartphone users in particular are more susceptible to taking insecure shortcuts to save time on tiny screens.

"The explosion of mobile devices connecting to the corporate network often creates greater opportunities for data loss and increased security management complexity," said Check Point Software's global marketing head, Juliette Sultan.

"We anticipate this trend will continue to rise in 2012, encouraging enterprises to enforce the proper remote access policies to minimise the frequency, risk and costs associated with securing the mobile enterprise," she said.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Meet the leading female front runners of the Kiwi channel

Meet the leading female front runners of the Kiwi channel

Reseller News honoured the leading female front runners of the New Zealand channel at the 2018 Women in ICT Awards (WIICTA) in Auckland. The awards honoured standout individuals across seven categories, spanning Entrepreneur; Innovation; Rising Star; Shining Star; Community; Technical and Achievement.

Meet the leading female front runners of the Kiwi channel
Meet the top performing customer-centric Microsoft channel partners

Meet the top performing customer-centric Microsoft channel partners

Microsoft honoured leading partners across the channel following a year of customer innovation and market growth in New Zealand. The 2018 Microsoft Partner Awards recognised excellence within the context of the end-user, spanning a host of emerging and established providers.

Meet the top performing customer-centric Microsoft channel partners
Reseller News launches new-look Awards at 2018 Judges’ Lunch

Reseller News launches new-look Awards at 2018 Judges’ Lunch

Introducing the Reseller News Innovation Awards, launched to the channel at the 2018 Judges’ Lunch in Auckland. With more than 70 judges now part of the voting panel, the new-look awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors.

Reseller News launches new-look Awards at 2018 Judges’ Lunch
Show Comments