October 15, 2011
NEW YORK, Oct. 14, 2011 /PRNewswire/ -- Though organizations spend significant resources to keep their computer networks protected from external security threats, significant security risks still remain as a result of the actions of their own employees, according to a recent Deloitte poll which surveyed nearly 1,200 information technology and business executives across the United States.
According to the survey, 40 percent of respondents are unaware if their organization has strategies, policies, procedures or technology controls in place to effectively enforce mobile security. Without an awareness of these policies, employees may be hard-pressed to comply with them.
Additionally, 28.4 percent of survey respondents believe there are unauthorized PDAs, tablets, or a combination of both connecting to their enterprise intranet, and particularly their e-mail servers. Unauthorized devices represent a significant security threat to organizations well beyond just the threat to the computing infrastructure itself.
"Devices like tablets, PDAs and smartphones have become ubiquitous over the past few years as people increasingly purchase them as tools to enhance their productivity at work and at home," said JR Regan, principal, Deloitte & Touche LLP and innovation leader to Deloitte's federal practice. "Despite the benefit of these new devices, they also present increased security threats for organizations which now must be wary of security threats originating from new channels."
Even with a general unfamiliarity around mobile security policies and precautions in their organization, the overwhelming majority of respondents are concerned about one or more organizational security risks. Nearly 87 percent of respondents feel their company is at risk for a cyber attack originating from a mobile security lapse. Additionally, 41 percent of respondents feel that their organization is at risk in each of the following areas: operational risks, technological risks, infrastructure and device risks and legal and regulatory risks.
The poll was conducted during Deloitte's Dbriefs Technology Executive series: "Securing Enterprise Social Media and Mobility Apps." For more information and to view the full results of the poll please visit: http://www.deloitte.com/view/en_US/us/Services/consulting/technology-consulting/50b77076deabf210VgnVCM3000001c56f00aRCRD.htm
As used in this document, "Deloitte" means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingDec 12, 2023
SecOps & DevSecOps in the CloudDec 14, 2023
What's In Your Cloud?Jan 17, 2024
Everything You Need to Know About DNS AttacksJan 18, 2024
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks