Broomfield, CO – November 13, 2012
A new mobile security study finds that the vast majority of organizations that allow employees to BYOD (bring your own device) are experiencing high rates of mobile threats, including lost or stolen devices, malware, and compromised company data. Conducted by Webroot, a leader in delivering Internet security as a service, the study exposes that the popular trend of allowing employees to use their smartphones and tablets at work is causing a significant drain on IT resources while at the same time putting corporate data at risk. The full report is available at www.webroot.com/shared/pdf/byod-mobile-security-study.pdf.
The study, which focused on mobile security decision-makers in the United States, United Kingdom and Australia, found an overwhelming 82 percent of respondents believe that mobile devices create a high security risk within the corporate environment. Results show that mobile security is a high priority for half of the companies supporting BYOD, equating to increased help desk support and consumption of valuable IT resources. In addition, 45 percent reported lost or stolen devices in the past year and 24 percent experienced mobile malware infections, crippling productivity and potentially compromising company and customer data.
However, larger organizations, those with 500 or more employees, are at even higher risk. According to the study, 67 percent had dealt with lost or stolen mobile devices and 32 percent had experienced mobile malware infections, creating widespread concern about the business impact of employee-owned devices within the enterprise.
"Supporting BYOD is now a reality for many companies. Contrary to conventional wisdom, we believe that BYOD does not really decrease operational costs. Rather, allowing employees to use personal mobile devices is actually increasing corporate risk and IT costs," said Christian Christiansen, Program Vice President, Security Products and Services, IDC. "Finding a balance between providing employees corporate access and ensuring corporate information security requires analysis, controls, monitoring, and granular policy-based enforcement."
Top-level corporate study findings:
- 63 percent of companies reported significant increases in demand for help desk support to repair, replace or manage the security of smartphones and tablets in the company, consuming as much as 36 percent of one help desk technician's time resolving these issues each month.
- 61 percent required additional IT resources to manage mobile security, resulting in higher costs.
- More than half reported mobile threats reduced employee productivity and disrupted business activities.
- Two-thirds of companies (67 percent) agree that the management of mobile device security is a great burden on IT resources.
- 46 percent of BYOD companies have implemented mobile security, but only 40 percent of companies with fewer than 100 employees have mobile security.
What Can Organizations Do?
Webroot advises that companies take the following steps to reduce the risks associated with BYOD.
- Establish device control policies: Create a policy that governs how your corporate IT staff can gain control over a personal device while maintaining your network security. Include information about how to keep personal information private (e.g., via a mobile device backup strategy such as containerization that doesn't touch personal data) and define corporate ownership over data and applications.
- Enforce device-level security: Both corporate-owned and personal devices should have secure passwords and screen locks; document this requirement in your mobile device policies. In addition, require that personal and corporate mobile devices maintain up-to-date, corporate-approved (and preferably corporate-managed) security software installed to guard against malware and other security risks.
- Develop and deliver mobile workforce security training: Security training will keep your mobile workforce productive and prepared to be the first line of defense against malware and other security threats to their mobile devices. Spell out your corporate policies and include a participant sign-off stating that they understand and will abide by the policies.
- Let your business drive mobile device security policies and training: Business requirements and culture drive the policies, training and other upfront work you do to support your mobile workforce security needs.
"Cyber criminals are increasingly targeting employees as access portals to a company's infrastructure, intensifying the need for controls and layered defenses that can identify and mitigate attacks," said Jacques Erasmus, chief information security officer at Webroot. "As the popularity of employee-owned devices in the workplace continues to grow, this defense needs to be supplemented with a coherent but simple BYOD management strategy, underpinned by three elements: device control policies, device-level security and mobile workforce security training."
About the Research
Between July 30 and August 1, 2012 Webroot commissioned a study of endpoint and mobile security decision-makers in companies with 10 or more employees in the US, UK, and Australia. The scope of the research included both BYOD and company-owned mobile devices. Research Now provided respondents from their online panel of IT and business executives. A total of 741 people responded to an online survey hosted by Qualtrics. The margin of error for the study is +/- 3.6 percentage points at the 95 percent level of confidence. 553 of the respondents were from BYOD (Bring Your Own Device) companies, organizations that allow employee-owned smartphones or tablets to access the company network for work purposes. The margin of error for the BYOD subsegment is ±4.2 percentage points.
©2014 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are trademarks or registered trademarks of Webroot Inc. in the United States and other countries.