The security threat of Bring Your Own Device (BYOD) initiatives

2021 BYOD Security Report reveals that security teams lack the visibility and technology needed to secure unmanaged personal devices against modern threats.

Bitglass, the Total Cloud Security company, today announced several findings from its 2021 BYOD Security Report that reveal the rapid adoption of unmanaged personal devices connecting to work-related resources (aka BYOD) and why organisations are ill-equipped to deal with growing security threats such as malware and data theft.

The study, a joint venture with Cybersecurity Insiders, surveyed hundreds of cybersecurity professionals across industries to understand better how COVID-19’s resulting surge of remote work has affected security and privacy risks introduced by the use of personal mobile devices. The insights in this report are especially relevant as more enterprises are shifting to permanent remote work or hybrid work models, connecting more devices to corporate networks and, as a result, expanding the attack surface.

“As mobility and remote work environments keep growing, so do challenges ranging from managing device access to handling urgent mobile security concerns,” said Holger Schulze, founder, Cybersecurity Insiders. “Our research uncovered a plethora of evidence that shows organisations are not paying enough attention to securing unmanaged personal devices and why the time is now for them to think differently when it comes to securing BYOD.” 

Key Findings from the Bitglass 2021 BYOD Security Report:   

BYOD is here to stay 

The shift to remote work amid the pandemic resulted in 47 percent of organisations reporting increased personal devices being used for work. As a result, a total of 82 percent of organisations said they now actively enable BYOD to some extent. While individual devices have helped businesses improve employee productivity and satisfaction while also reducing costs, challenges associated with managing device access and mobile security remain. 

Securing BYOD to prevent data loss/theft is a top concern  

The most critical concern respondents expressed was data leakage or loss (62 percent). Other apprehensions included:

  • Users downloading unsafe apps or content (54 percent).
  • Lost or stolen devices (53 percent).
  • Unauthorised access to company data and systems (51 percent). 
Enterprises are running blind when it comes to securing BYOD devices against modern security threats.

Only 22 percent of organisations indicated they can confirm that unmanaged devices have downloaded malware in the past 12 months. However, nearly half (49 percent) indicated they are not sure or could not disclose whether the same could be said for them. This lack of visibility can be detrimental to the overall business.

Many organisations are securing BYOD with old tools vs modern threats

A total of 41 percent of organisations reported relying on endpoint malware protection for BYOD—an approach that is not ideal for personal devices which are hard to control and manage. Over a quarter (30 percent) of firms said they don’t protect against malware for BYOD at all.While cloud-based malware protection tools are often a far better fit, only 11 percent of organisations surveyed are currently using these measures. 

“As enterprises begin to shift to hybrid work environments, personal devices will provide the flexibility and remote access that employees require. This new way of working, however, will undoubtedly stretch the resources of security teams,” said Anurag Kahol, CTO, Bitglass. “This is why there has never been a more important time for enterprises to rethink their approach seriously and secure all forms of communication amongst users, devices, apps, or web destinations.” 

READ MORE:

Methodology 

Cybersecurity Insiders surveyed 271 cybersecurity professionals, conducted in April 2021, to gain deep insight into mobile BYOD security threats faced by organisations and the solutions to prevent and remediate them. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organisations of varying sizes across multiple industries.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...

Enabling “Farm to Fork” efficiency between supermarkets & producers

Neil Baker • 03rd April 2024

Today, consumers across the UK are facing a cost of living crisis. As a result, many retailers and supermarkets are striving to keep their costs down, so that they can avoid passing these onto shoppers. Within this, one area that is increasingly under scrutiny for many organisations surrounds how to improve supply chain efficiency. This...

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!