Security stifling BYOD adoption

Security stifling BYOD adoption

Advances in both IT systems and mobile technology have allowed BYOD efforts to come on leaps and bounds in recent years, but security is often not keeping up.

The growth of BYOD in the work place has been driven by the benefits of employee productivity, but has also been stifled by many companies failing to implement an adequate security practice to ensure that data is protected.

A recent survey conducted by Information Week 2013 found that although around nine in ten businesses support workers wanting to store company data on mobile devices, 78 per cent were concerned over lost or stolen devices compromising their level of mobile security.

That was well ahead of other cited concerns such as forwarding data to cloud-based storage services (36%) and mobile malware in applications from public app stores (34%).

But it seems that despite IT identifying the right areas of concern, not enough is being done to tackle these potential problems.

According to Information Week, the first step is to ensure that your business has a rigid mobile policy and that all workers are positive about what is involved and that employees follow the rules.

However, it also argues that companies need to show a greater level of enthusiasm towards ideas such the encryption of mobile devices to guard against loss or theft.

The lack of adoption for such an approach comes despite the fact that many IT departments (43 per cent) view encryption as one of the top-three security capabilities needed from and MDM system.

Yet in 51 per cent of cases, the on-device encryption policy varies depending on the type of device, ownership or approved use.

There is also a suggestion that many workers need to be educated on the proper ways in which to use encrypted devices, with 22 per cent of companies claiming that their workers did not have the skills to manage encryptions.

It seems that companies and employees alike need to ensure that they educate themselves on how to adequately manage the use of mobile devices so as not to compromise the security of data.