Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Acronis finds gaps in BYOD policy

Anuradha Shukla | July 18, 2013
60% of companies have no personal device policy in place.

Businesses are ignoring bring-your-own-device (BYOD) policies and about 60 percent of companies are vulnerable to BYOD risks, according to Acronis’ 2013 Data Protection Trends Research. 

The survey was conducted across eight countries during March and April 2013. About 4000 IT practitioners were surveyed in mid- to large-sized organisations across a range of industries.

Findings from a new survey from Acronis and the Ponemon Institute indicate big gaps in BYOD policies of companies suggesting these enterprises are putting critical data at risk.

Failure to follow security policies lead to loss of confidential data, attack from hackers and threat from harmful malware. 

“BYOD is a huge opportunity for companies, but it also brings security challenges,” said Simon Howe, sales director, Mobility Solutions APAC for Acronis. “Our research shows troubling signs of negligence in the face of these dangers by many organisations.”

Lack of education

About 80 percent of the organisations surveyed haven’t educated their employees on BYOD privacy risks. Over 30 percent of organisations don’t allow accessing the network from personal devices.

While 31 percent of companies expect employees to have a device password or key lock on personal devices, 21 percent perform remote device wipes when employees leave the company.

Although corporate files are shared through third-party cloud storage solutions, 67 percent of the organisations don’t have a policy in place around public clouds.

Acronis advises companies to train their employees in safe BYOD practices and put effective data protection solutions in place to prevent data loss. 

“Personal devices have permanently and positively changed the workplace, particularly in the ways employees collaborate, work remotely and interact with company data,” said Howe. “With policies and solutions that manage the flow of data between multiple devices and environments, companies can practise safe BYOD with confidence.”

 

1 

Sign up for Computerworld eNewsletters.

COMMENTS
blog comments powered by Disqus