Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
09:20 AM
Candace Worley
Candace Worley
Partner Perspectives

Protect Yourself by Protecting Others

How the consumerization of IT is affecting endpoint security.

What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal devices for work, and their work devices for personal activities.

Work for many people happens whenever and wherever with whatever device is handy. They may be checking work email on personal laptops in the morning, doing a quick review of documents on their phones while waiting in line for coffee, or editing presentations on tablets (that were forwarded to their personal emails) while watching TV. However it happens, corporate data is wandering around outside the network, potentially unprotected.

At the same time, our busy and connected world is compelling people to do personal activities on their work devices, whether it’s personal email, checking up on their social networks, or shopping online. Whatever your employees are doing, it means that any risky behavior can potentially end up affecting your corporate systems.

With this increasingly blurred line between personal and work spaces, there is the potential for enhanced productivity, intuitive collaboration, and increased responsiveness. There is also the potential for data loss, malware infection, and other malicious traffic. Clearly defined policies on acceptable use, bring your own device, which applications and websites are permitted, where not to access corporate data, and consequences of not following these policies are an excellent place to start.

However, like managing contagious diseases, policy and education are not enough; companies need some preventative actions as well. The majority of people surveyed by MSI Research (77%) feel confident that their employers are protecting their data, whether it is corporate or personal. Unfortunately, this means that they are less likely to take action to protect their devices. Extending corporate endpoint protection to personal devices is like hand washing or vaccines; it is the easiest and most effective method of reducing the spread of infection or malware.

Next is the practice of encrypting corporate data from source to endpoint. With file-sharing services – a common method of moving data between devices – files could be in multiple locations at the same time. In the event that the file-sharing service is hacked or your employee’s phone, tablet, or laptop is lost or stolen, encrypted data is safe from prying eyes, regardless of where the files are stored. End-to-end encryption also protects your data when used in unprotected mobile Wi-Fi locations, which most consumers use without thinking of the risks.

This consumerization of IT has brought with it many improvements in productivity and collaboration, driven by experiences and expectations your employees have outside of work. It is important to support this new paradigm, which means extending your digital security perimeter to protect your company.

Candace Worley is the senior vice president and general manager for the Endpoint Security Business at Intel Security, responsible for developing and executing the strategic direction around Endpoint Protection for PCs, laptops, tablets, mobile phones, and embedded devices. ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory ...
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the sam...
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety r...