The Coalfire Blog

Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, RetailFinancial Services, Healthcare, Higher Education, Payments, Government.

The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts.

The Coalfire Blog

BYOD Survey Results: Employees are not playing it safe with company data

August 14, 2012, Mike Weber, Vice President, Coalfire Labs

Bookmark and Share

Mike Weber

Employers are seeing a drastic increase in the number of employees using personal smartphones and tablets in the office. This “Bring Your Own Device” (BYOD) trend is causing headaches for the IT department and there is no stopping this trend. Due to the sensitive nature of company information often accessed on those devices, it has become a growing concern for small and large businesses alike.

The risk associated with allowing employees to access sensitive information on their personal devices can become a huge causality for a business if lost or stolen. Many companies are reaching out about what are the best practices for decreasing the risk associated with this trend.

In response to such questions, we decided to conduct our own survey on the trend to see how many companies are actually using safe methods when it comes to their mobile device usages policy. What we found was surprising.

After surveying 400 individuals in a variety of different industries (not affiliated with IT) across North America, we found that more than half (of the 84 percent of respondents who use the same mobile device for personal use and work) report their companies have NO mobile device usage policy set up.

The weekly hype about data breaches and different companies being compromised is astounding.  We were taken back by the lack of simple defenses companies should be using to protect themselves. The majority of individuals are still using “unsafe” methods when it comes to mobile device security. But more importantly, very little is being done by companies to safeguard this problem.

This inforgraphic showcases some of the most important insights our survey found:

We’ve taken these findings and digested this information further in our perspective on Bring-Your-Own-Device.  Click the link to view the complete results of this BYOD survey.

<< Go Back

Bitzer Mobile
It's scary to think that such a large percentage of employees are not clear on company mobile usage policies. For e.g. employees are not sure what happens if their mobile is lost or stolen..if their company data can be safely wiped out. The risks associated with this lack of clarity is enormous that companies cannot be laissez faire about this!!
8/20/2012 12:11:59 PM

Post Topics



Accounting Agency AICPA Assessment assessments ASV audit AWS AWS Certified Cloud Practitioner AWS Certs AWS Summit bitcoin Black Hat Black Hat 2017 blockchain Blueborne Breach BSides BSidesLV Burp BYOD California Consumer Privacy Act careers CCPA Chertoff CISO cloud CMMC CoalfireOne Compliance Covid-19 credit cards C-Store Culture Cyber cyber attacks Cyber Engineering cyber incident Cyber Risk cyber threats cyberchrime cyberinsurance cybersecurity danger Dangers Data DDoS DevOps DevSecOps DFARS DFARS 7012 diacap diarmf Digital Forensics DoD DRG DSS e-banking Education encryption engineering ePHI Equifax Europe EU-US Privacy Shield federal FedRAMP financial services FISMA Foglight forensics Gartner Report GDPR Google Cloud NEXT '18 government GRC hack hacker hacking Halloween Health Healthcare heartbleed Higher Education HIMSS HIPAA HITECH HITRUST HITRUST CSF Horror Incident Response interview IoT ISO IT JAB JSON keylogging Kubernetes Vulnerability labs LAN law firms leadership legal legislation merchant mobile NESA News NH-ISAC NIST NIST 800-171 NIST SP 800-171 NotPetya NRF NYCCR O365 OCR of P2PE PA DSS PA-DSS password passwords Payments PCI PCI DSS penetration Penetration Testing pentesting Petya/NotPetya PHI Phishing Phising policy POODLE PowerShell Presidential Executive Order Privacy program Ransomware Retail Risk RSA RSA 2019 Safe Harbor Scanning Scans scary security security. SOC SOC 2 social social engineering Spectre Splunk Spooky Spraying Attack SSAE State Stories Story test Testing theft Virtualization Visa vulnerability Vulnerability management web Wifi women XSS