According to the findings, almost three quarters of employees are now allowed to access company data from their personal devices. In fact, regardless of whether they were in a BYOD-approved environment or not, employees equally appear to be device obsessed -- nearly 86% of employees use their devices for work all day and night, with 44% doing so even during meals. Additionally, 20% of respondents consider themselves "borderline workaholic," 15% bring their devices on vacation, and 7% claim that their work and home lives are one.
This growing trend to work remotely is likely to have an impact on breaches and data leakages as mobile devices continue to have major security implications. Half of respondents stated that someone within their company has lost a device with important company data on it -- and over a fifth admitted that a lost device had created a security implication for their company. The study found that implementing a BYOD policy seems to have a small, though arguably statistically insignificant, positive effect on security as illustrated by a 5% drop in incidents at companies that have a BYOD policy.
By far the most popular method to secure mobile devices is password protection (57%), followed by 35% who wipe devices remotely, and 24% who use encryption.
Surprisingly, employees were not just concerned with their organization's security. A staggering 57% believe that using a personal device for work could pose a security risk to them personally through potential leakage and misuse of confidential health and personal information. At the same time, productivity drain is greater for companies that allow BYOD -- nearly a quarter of employees stated that they spend more time than they care to admit using their personal device for personal use during work hours.
"Being connected to work around the clock appears to be accepted as the 'new normal,'" said David Gibson, VP of Strategy at Varonis. "While organizations are capturing the many benefits of BYOD -- and the willingness of the workforce to embrace this style of working -- companies must protect themselves by:
Developing a BYOD policy that lets people know what is and isn't allowed.
Making sure controls are appropriate to the risks -- if the data is valuable, organizations need to control where it resides and who has access to it, need to be able to audit use, spot abuse.
Monitoring the effects of frequent interruptions and 'always on' habits to watch for signs of impaired productivity or health.
"Only by limiting the potential damage -- both to organizations and employees -- can organizations make the most of a trend that will continue to leap forward, whether businesses allow it to or not."
To download the full BYOD research report, visit http://hub.varonis.com/BYOD-report
Varonis is the leader in unstructured and semi-structured data governance software. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.
Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily with whom they must, and organizations can be confident their content is protected and managed efficiently.
Voted one of the "Fast 50 Reader Favorites" on FastCompany.com, and winner of the SC Magazine Innovation, Product or Service of the Year, and Best Network Security Awards, Varonis has more than 4,500 installations worldwide and is headquartered in New York, with regional offices in Europe, Asia and Latin America.
Varonis, the Varonis logo, DatAdvantage®, DataPrivilege® and the IDU Classification Framework® are registered trademarks of Varonis® Systems in the United States and/or other countries and Metadata Framework&trade, DatAnywhere&trade, and Data Transport Engine&trade are under a registration process in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only.