BYOD security seen much differently by IT department and employees

BYOD security seen much differently by IT department and employees

Study finds that while employees are eager to access corporate resources from their mobile devices, they have little tolerance for controls IT wants to impose

Article comments

In its November 2012 Blue Coat Mobility Study, the company surveyed 350 respondents and found that most organisations allow employees access to company email (83%) and instant messaging (56%) on personal devices, but far fewer open up ERP (31%), sales force automation (24%) and supply chain management (19%) applications to mobile devices that aren't corporate-owned.

"Organisations are trying to figure out how to safely deploy apps beyond email, but right now it's mostly just email," says Timothy Chiu, director of product marketing at Blue Coat.


IT doesn't recognise how pervasive BYOD is

Organisations are clearly uncertain about mobile malware and employee acceptance of the IT organisation placing security controls on employees' personally owned devices, Chiu says, but that also means those organisations are not fully realising the business productivity potential of mobility. Those IT organisations also don't fully recognise how pervasive BYOD has become among company employees, he says.

Blue Coat found that, on average, IT staffers believe that 37% of employees access corporate resources from their own devices. But 71% of employees report they do so. Employees are also much more cavalier about the security risks associated with their devices. Blue Coat found that 88% of employees believe their device is very or somewhat secure. Meanwhile, a whopping 77% of IT managers see the risk of malware spreading to the corporate network from mobile devices as moderate to very high.

Mobile malware a minor threat, but phishing isn't

Chiu concedes that while malware is a growing threat in the mobile sphere (particularly with Android devices), mobile malware is still a relatively minor threat. However, mobile devices often make their users more vulnerable to phishing attacks.

"Phishing on a mobile device is almost impossible to pick up," he says. "Mobile phones are much worse than desktops at protecting you from phishing."

For instance, in a normal browser an observant user can spot a fraudulent link when hovering the mouse over a URL. But with a mobile device you typically have to actually touch a link before the mobile browser displays the URL. In addition, mobile browsers tend to autohide the address bar when you go to a site so as to maximise screen real estate. If you've been lured to a fake banking page, it's unlikely you'll spot the phony URL if you're on a mobile device.

Employees have little tolerance for mobile security controls

Regardless of the risks and the fact that employees want access to corporate resources from their mobile devices, the survey found that employees have relatively little tolerance for IT placing security controls on their personal devices. Blue Coat found that only 24% of employees would be willing to let IT log their corporate data access from personal mobile devices, only 19% would be willing to let IT log any web content they access with their personal mobile devices on a corporate network and only 12% would allow restrictions on the types of sites or content that can be accessed with their personal mobile devices on a corporate network.

However, Chiu notes that many IT organisations are already doing these things without employees recognising it.

"People who are accessing these corporate networks are being logged and they don't realise it," he says. "And the regulations have come down pretty clear on this: The corporate network is a corporate-owned resource and companies are allowed to log what they want."

"Employees just don't realize how much control's already put on them already," Chiu adds. "They don't realize until they get a block or aren't able to get to a specific site."

Blue Coat says 41% of IT organisations log corporate data access from mobile devices, 37% restrict the types of sites or content that can be accessed from mobile devices on their network and 34% log any web content accessed from mobile devices on their network.

Share:

Comments

Send to a friend

Email this article to a friend or colleague:


PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.


We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open
* *