• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   Consumer devices in workplace still a challenge, study finds

Consumer devices in workplace still a challenge, study finds

  • Posted on:September 22, 2011
  • Posted in:Current News, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

"Consumerization of IT" is a phrase that has been tossed around a lot lately, especially as more employees bring personal mobile devices, like smartphones and tablets, into the workplace.

However, the trend isn't limited to handheld devices. It also includes laptops and other traditionally consumer computing equipment being used for work. On this front, IT consumerization has been around for years, but it has only recently begun picking up steam with the advent of the cloud and the adopted worker attitude of "work anywhere, at anytime."

According to a new study from Dell KACE and Dimensional Research, which surveyed nearly 750 IT professionals, 87 percent of businesses allow employees to use their personal devices for work. Eighty percent support employee-owned smartphones, and 69 percent allow employees to bring their own laptops and desktops to the office.

On one hand, this can promote productivity in the workplace. By allowing employees to use a device and software with which they're comfortable, they may work more efficiently.

On the other hand, this proliferation of consumer devices in the office creates myriad challenges for the IT department. Not only do IT professionals have to worry about supporting a range of devices, they also have concerns about the data security implications of employee-owned hardware.

According to the Dell KACE study, 82 percent of surveyed IT professionals harbor concerns about personal devices in the workplace. Sixty-two percent are worried about network security and the possibility of unauthorized users accessing corporate information or corrupting the IT infrastructure.

"Consumer products are evolving into viable businesses tools, but according to our research, the majority of companies do not have a proper strategy in place to manage these devices, which opens them up to serious security risks," Dianne Hagglund, Dimensional Research senior research analyst, said in a press release.

This sentiment was reflected in a March 2011 study from Mformation Technologies. According to that study, more than three-quarters of surveyed CIOs from the United States stated that personal mobile devices in the workplace create "security headaches" for the IT department.

Mobile malware is obviously a growing threat for both businesses and consumers. Among the other challenges associated with the consumerization of IT are keeping track of devices and controlling who has access to what information. According to the Dell KACE report, two-thirds of respondents say they are not confident they know of all personal devices used for business. One-third said unauthorized devices and applications are used in the workplace.

Additionally, businesses may find they have trouble supporting multiple operating systems, which may now include Microsoft Windows, Research In Motion's BlackBerry OS, Apple's iOS, Google's Android and many, many more.

"Consumerization of IT is not simply a passing trend – it is the way business will be conducted on an ongoing basis, especially in the small and medium business market, so it is critical that companies put policies and standards into place to support these devices to ensure the security of corporate and intellectual property," Hagglund added.

Though more employees now expect to be able to use their personal devices in the workplace, companies should not rush to push through these policies. For example, if a company is unsure about its ability to support a certain mobile OS, it is best to wait until its security measures are as airtight as possible before allowing employees to bring such devices to work. Additionally, businesses must educate employees about data security implications of personal devices and ensure employees are doing all they can to protect corporate information.

Related posts:

  1. Nearly 40 percent of SMBs plan to move to cloud, Microsoft study finds
  2. Three quarters of businesses suffered data breaches in 2010, study finds
  3. Companies sacrificing security for performance, study finds
  4. Half of companies lose data, study finds

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.