A new survey finds that 58 percent of respondents believe access to their network from non-corporate and personally owned devices such as laptops, desktops or mobile phones is the highest risk in managing remote users.
The study from trusted access specialist Duo Security shows that while the trend to remote working has created unmatched flexibility and helped organizations attract top talent globally, it has also introduced a major predicament for IT and security teams.
A new study finds that enterprise networks have thousands of shadow personal devices including laptops, tablets and mobile phones, as well as Internet of Things devices -- such as digital assistants and smart kitchen appliances -- connecting to them.
The report from network control company Infoblox shows 35 percent of companies in the US, UK and Germany reported more than 5,000 personal devices connecting to the network each day.
Businesses go to great lengths to protect their corporate networks, but when staff take work home it can be hard to ensure data is kept secure when using personal devices and accessing data from the cloud.
In an innovative move, endpoint protection company Cylance is offering employees of companies that use its software the chance to use Cylance's enterprise-grade AI-powered endpoint prevention to protect their family's home PCs and Macs against malicious attackers.
Allowing employees to access corporate data via their own devices is increasingly popular, but it does present risks if not implemented correctly.
A new report from data protection company Bitglass finds one in four organizations do not have multi-factor authentication methods in place to secure BYOD -- a well-known enterprise security gap.
Thanks to increased use of mobile and BYOD devices, there's a significant risk to business networks from un-managed and uncontrolled devices which could offer a route for security breaches.
Israeli startup company Axonius is looking to solve this problem with a new platform designed to eliminate blind spots on the network and provide a single place to understand, manage and control the security of all end user, compute and IoT devices.
If you study graphs related to the adoption rate of BYOD and BYOD spending, you’ll notice that it’s pretty steep. While growth may have been gradual from 2010 through 2014, adoption rates have skyrocketed over the last couple of years.
Enterprises and small businesses alike are finally realizing that BYOD is no longer an optional strategy if they want to remain competitive.
BYOD is dying. It’s not that people no longer bring devices to work. It’s that everyone brings their devices to work. Whether you use BYOx (bring your own everything) to describe this phenomenon or some other term, there are important concerns to be addressed.
For example, will you be providing devices to all employees, some employees (e.g., managers and executives) or no employees? How will user-owned devices connect to the network and how do you ensure personal and corporate data separation? What about company-owned devices and who owns, and thus has free access to, the data stored on them? And what happens when a device with company data or the ability to connect to the company network is stolen?
Smartphones, even personal ones, are no strangers to the workplace. With the increase in adoption of BYOD initiatives, more and more employees are using their smartphones for everyday job tasks.
However, according to a new report by LaptopsDirect.co.uk, British workers are also using personal smartphones for private communication, during work hours, as well.
There is a strange side-effect to the Bring Your Own Device initiative, and one that's slowing it down. Apparently, many employees refrain from bringing their own devices to work for the fear of being judged.
No, not because their devices are old or slow, but because others will think they're using them for personal instead of professional reasons.
The trend for increasing numbers of employees and customers bringing their own devices into a workplace can seriously impair a businesses’ access to the Internet.
The problem is that as more mobile devices connect to the network, a business can quickly discover that its cloud-based applications, payments systems, accounting, stock control, customer relationship management (CRM) and business applications have become hopelessly sluggish.
Nowadays, practically everyone is connected to the Internet at home, in the office and on the move. This has introduced fantastic opportunities for businesses and employees to operate smarter. Bring Your Own Device (BYOD); the concept of allowing employees to work in the office or remotely using their own devices, rather than company owned, has been around for a while now and really makes the most of this 'personal device era'. It’s convenient for employees to use their own devices, reduces burden on IT admin and saves Capex costs for the business. But, could BYOD end up being the company’s biggest threat?
Employees now have the opportunity to use their own personal devices for work purposes. The thought behind this is that employees are already familiar with their own devices and already have them on hand at all times. BYOD is generally a good thing, but it is not without its challenges and concerns. Like any new development, the risks need to be evaluated. But, in theory, team members will be more productive and happier at work with a BYOD scheme in place.
Of employees in the US who use their personal smartphones for work, 45 percent are required to do so by their employers and 55 percent do so voluntarily. However, of those voluntary users 42 percent feel pressured to use their phone for business use outside of work.
This is among the findings of a new survey by platform services company Syntonic which reveals mounting pressure on employees to use their personal devices for work even if not required by their employer.
The US mobile workforce is set to grow to 105.4 million workers by 2020 according to IDC and this creates a challenge for businesses trying to control and secure deployments.
In a bid to make things easier, networking solutions company Brocade is launching its latest Ruckus Cloudpath platform to enable IT organizations of any size to easily establish secure, policy-based access for wired and wireless devices.
When employees started bringing their devices to work with the rise of the smartphone, companies in all industries feared what that would mean for productivity and security. Nowadays, personal devices in the workplace are a given -- so much so that Bring Your Own Device programs (BYOD) are being implemented across the enterprise at an increasing rate.
Unfortunately, those programs come at a price. Organizations that have attempted implement a BYOD program, however are largely failing as employees don’t want the company to control their entire device.
With the rise of smartphone technology, BYOD -- or bring your own device -- certainly cannot be ignored by businesses. Whether they endorse the policy of using personal devices for workplace tasks or not, employees will use the best tools, or those they are most familiar with, to complete tasks, which frequently means using their own smartphone.
Of course, this extends far beyond simply taking work calls. Smartphones in the workplace are now being used to access corporate applications and perhaps more importantly, the data that they contain. Disregarding the mobility benefits of BYOD, this raises a number of security risks that businesses must consider.