CIOs are concerned about the growing consumerisation of IT, according to a newly released report by Check Point Software Technologies.
Smartphones and tablet PCs are becoming very popular in corporate
environments and the report shows about 71 percent of businesses believe mobile devices have caused an increase in security incidents.
Based on a survey of more than 750 IT and security professionals located in the U.S., Canada, U.K., Germany and Japan, the study 'The Impact of Mobile Devices on Information Security' shows that the number of personal mobile devices connecting to the corporate network has more than doubled in the past two years.
About half of these devices store sensitive data, says Check Point Software Technologies, the global specialist in securing the Internet.
"The explosion of mobile devices connecting to the corporate network often
creates greater opportunities for data loss and increased security
management complexity," said Juliette Sultan, head of global marketing at Check Point Software Technologies.
"We anticipate this trend will continue to rise in 2012, encouraging enterprises to enforce the proper remote access policies to minimise the frequency, risk and costs associated with securing the mobile enterprise."
Lack of security awareness
The majority of businesses said the lack of security awareness among employees is the greatest factor impacting mobile data and about half of respondents (43 percent) believe Android devices pose a larger security risk to the mobile enterprise as compared to Apple and BlackBerry.
Apple (30 percent) and BlackBerry (29 percent) were identified as the most common types of mobile devices connecting to corporate networks, followed by Android (21 percent).
The survey also indicates that about 71 percent of businesses believe smartphones and tablet PCs have increased the number of security events in their organisations within the past two years.
"A good mobile security strategy will focus on educating employees about mobile security policies, while simplifying management and enforcing the proper secure access controls to protect data on-the-go," said Sultan. "Check Point offers customers this level of flexibility - enabling businesses to secure all networks, endpoints and mobile devices with a holistic view of the corporate environment."
Sign up for Computerworld eNewsletters.