One in Four Business Users Surveyed Admitted to Having a Security Issue on Their Private Device in 2013
Despite the rise in the use of personal devices for business use, U.S. consumers are showing scant concern for security when it comes to bring your own device (BOYD). According to a recent survey by Gartner, Inc. a quarter of business users admitted to having had a security issue with their private device in 2013, but only 27 percent of those respondents felt obliged to report this to their employer. The survey was conducted in the fourth quarter of 2013 with 995 full or part time workers in the U.S., all of whom use a private device for work purposes.
In today’s blog post, Meike Escherich, principal research analyst at Gartner, said that employee use of private mobile devices to access corporate information and services is exploding and with this trend comes a series of potential drawbacks.
Ms. Escherich said:
The threat of cyber attacks on mobile devices is increasing and can result in data loss, security breaches and compliance/regulatory violations. One of the biggest challenges for IT leaders is making sure that their users fully understand the implications of faulty mobile security practices and to get users and management to adhere to essential steps which secure their mobile devices. For many organizations, overcoming BYOD security challenges is a full-time task, with a host of operational issues.
Nearly half of the survey respondents said they spend more than one hour each day using private devices for work purposes. The data also suggests that around half of respondents regularly use their devices for social as well as productivity tasks. This has different implications. It might point to employees considering their personal devices as necessary tools for their jobs. On the other hand, it also points to work-related documents regularly being transferred to private devices, leaving the security of the company network. In fact, 20 percent of respondents also stated that they do access data behind the workplace firewall using private devices.
Whatever the activity and the duration, any work activity on a private device inherently carries the threat of a security breach. That leaves IT organizations scrambling to come up with the right mix of mobile security defenses to balance protection, governance and user flexibility. Businesses will need help from telecoms service providers (TSPs) to evaluate and implement policies and procedures, ongoing user education, and sourcing and deploying mobile security, encryption and mobile device management (MDM) solutions.
The key to having a secure device is making sure it is well-managed. Enterprises are being compelled to make decisions about whether or not to allow employee-owned devices to access their enterprise's network and information.Failure to embrace BYOD will force it underground and into the shadows, where it will have the potential to publicly expose private data and open the enterprise to a data breach situation.
In our survey, 26 percent of respondents said their employer required use of BYOD devices and 15 percent had signed a BYOD agreement. A third of respondents have employers who are aware but don’t have a policy in place, and the rest said their employer was either not aware or they didn't know. This means 59 percent of survey respondents who regularly use their private devices for work have not yet signed a formal agreement with their employer.
Organizations that do decide to allow employee-owned devices need to develop solid BYOD policies based on their business requirements and risk profiles. At the moment, BYOD laptop, smartphone and tablet security policies are still incomplete in many companies, and contain gaps and other inconsistencies that don't measure up to business obligations. Many enterprises (especially in the smaller and midsize sector) lack the proper organizational structures to create these policies and must reorganize to provide the necessary governance for a successful mobility implementation.
For a BYOD program to work there has to be strict policy enforcement and compliant users - an issue that CIOs and IT directors are grappling with right now. All policy agreements have to be created with clear guidelines for cases of security breaches.
BYOD security threats and trends will be discussed at the Gartner Security & Risk Management Summit taking place June 23-26 in National Harbor, Maryland. More information on the this event can be found at http://www.gartner.com/technology/summits/na/security/.
Members of the media can register for press passes to the Summit by contacting firstname.lastname@example.org .
Information from the Gartner Security & Risk Management Summits 2014 will be shared on Twitter at http://twitter.com/Gartner_inc using #GartnerSEC.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. The company delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is the valuable partner to clients in approximately 10,000 distinct enterprises worldwide. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, USA, and has 7,900 associates, including more than 1,700 research analysts and consultants, and clients in more than 90 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.