Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

3/6/2013
11:34 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey: Half Of Companies Have Lost A Device With Important Data

According to Varonis, almost three quarters of employees are now allowed to access company data from their personal devices

NEW YORK, NY--(Marketwire - Mar 5, 2013) - Research conducted by Varonis, the leading provider of comprehensive data governance software, found that half of companies have lost a device with important company data on it, causing security implications for over a fifth of organizations. Further, 57% of employees believe that BYOD puts their personal data at risk as well. Despite these concerns, the study also revealed that 86% of the workforce are obsessed with their devices.

According to the findings, almost three quarters of employees are now allowed to access company data from their personal devices. In fact, regardless of whether they were in a BYOD-approved environment or not, employees equally appear to be device obsessed -- nearly 86% of employees use their devices for work all day and night, with 44% doing so even during meals. Additionally, 20% of respondents consider themselves "borderline workaholic," 15% bring their devices on vacation, and 7% claim that their work and home lives are one.

This growing trend to work remotely is likely to have an impact on breaches and data leakages as mobile devices continue to have major security implications. Half of respondents stated that someone within their company has lost a device with important company data on it -- and over a fifth admitted that a lost device had created a security implication for their company. The study found that implementing a BYOD policy seems to have a small, though arguably statistically insignificant, positive effect on security as illustrated by a 5% drop in incidents at companies that have a BYOD policy.

By far the most popular method to secure mobile devices is password protection (57%), followed by 35% who wipe devices remotely, and 24% who use encryption.

Surprisingly, employees were not just concerned with their organization's security. A staggering 57% believe that using a personal device for work could pose a security risk to them personally through potential leakage and misuse of confidential health and personal information. At the same time, productivity drain is greater for companies that allow BYOD -- nearly a quarter of employees stated that they spend more time than they care to admit using their personal device for personal use during work hours.

"Being connected to work around the clock appears to be accepted as the 'new normal,'" said David Gibson, VP of Strategy at Varonis. "While organizations are capturing the many benefits of BYOD -- and the willingness of the workforce to embrace this style of working -- companies must protect themselves by:

Developing a BYOD policy that lets people know what is and isn't allowed.

Making sure controls are appropriate to the risks -- if the data is valuable, organizations need to control where it resides and who has access to it, need to be able to audit use, spot abuse.

Monitoring the effects of frequent interruptions and 'always on' habits to watch for signs of impaired productivity or health.

"Only by limiting the potential damage -- both to organizations and employees -- can organizations make the most of a trend that will continue to leap forward, whether businesses allow it to or not."

To download the full BYOD research report, visit http://hub.varonis.com/BYOD-report

About Varonis

Varonis is the leader in unstructured and semi-structured data governance software. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.

Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily with whom they must, and organizations can be confident their content is protected and managed efficiently.

Voted one of the "Fast 50 Reader Favorites" on FastCompany.com, and winner of the SC Magazine Innovation, Product or Service of the Year, and Best Network Security Awards, Varonis has more than 4,500 installations worldwide and is headquartered in New York, with regional offices in Europe, Asia and Latin America.

Varonis, the Varonis logo, DatAdvantage®, DataPrivilege® and the IDU Classification Framework® are registered trademarks of Varonis® Systems in the United States and/or other countries and Metadata Framework&trade, DatAnywhere&trade, and Data Transport Engine&trade are under a registration process in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1627
PUBLISHED: 2020-04-08
A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending ...
CVE-2020-1628
PUBLISHED: 2020-04-08
Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet, leading...
CVE-2020-1629
PUBLISHED: 2020-04-08
A race condition vulnerability on Juniper Network Junos OS devices may cause the routing protocol daemon (RPD) process to crash and restart while processing a BGP NOTIFICATION message. This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 16.2 versions prior to 16.2R2-S11; ...
CVE-2020-1630
PUBLISHED: 2020-04-08
A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to perform unauthorized configuration modification. This...
CVE-2020-1634
PUBLISHED: 2020-04-08
On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. This issue affects both IPv4 and IPv6. This issue ...