Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:33 PM
Connect Directly

The Blurred Line Between Business And Personal Online Use

IDC-Unisys report shows enterprises struggling to keep up with workers adopting smartphones, social media, other consumer technologies for both home and work use

Half of business users worldwide employ their smartphones and other Web applications for both work and personal use, mixing data from the two worlds freely. And most have purchased at least one device on their own for use at work, according to a newly released report.

IDC's new "Consumerization of IT" report, which was commissioned by Unisys, demonstrates how IT organizations are not keeping up with the adoption of new technologies by their users. The report -- which was researched in two parts, with a survey of 2,820 telecommuters in 10 countries and a survey of 650 IT decision-makers from around the world -- found that consumer devices, such as smartphones, and social networking and similar applications are blurring the lines between business and personal technology usage.

"The 'consumerization of IT' revolution is being driven not top-down by corporate IT departments, but by tech-savvy iWorkers who are hungry for information and rich with ideas on new ways to innovate, serve customers, and operate more efficiently. Our research indicates that organizations have miles to go to get ready for this wave and risk being left behind as fresh competitors exploit the consumer IT tidal wave and upend old business and IT models," said Sam Gross, vice president for global IT outsourcing solutions at Unisys.

IDC found that while 73 percent of IT executives said their enterprise networks are "very secure," more than 40 percent of workers said they use instant messaging and texting for business purposes, and nearly 25 percent, blogs and professional online communities. Workers said they use an average of four consumer devices and various third-party applications, including social networking sites, during the workday.

While IDC says the number of workers using smartphones in their jobs will double through 2014, less than half of enterprises said they let workers access enterprise apps via their smartphones today.

A disconnect appears to exist between what employers allow consumer technology-wise and what workers say they can use: Sixty-nine percent said they can reach nonwork-related websites during their workday, while 44 percent of employers said that is the case. And more than half of the workers said they are able to store personal data on company systems, whereas 37 percent of IT decision-makers said this is allowed.

Social networking is on the rise in organizations, with IT decision-makers expecting a 10 to 30 percent increase in the next year. Even so, 46 percent of employees in the survey said their employers don't do a good job integrating consumer devices and social networks with enterprise apps. More than 40 percent of businesses don't have actual rules for the use of social media.

"The research shows a profound disconnect between what iWorkers are doing with consumer technologies in the enterprise and what IT leaders believe is happening in their organizations," said John Gantz, chief research officer and senior vice president at IDC. "IT leaders cannot effectively secure, manage, or plan for the future without an accurate understanding of the trend and its implications. The 'consumerization of IT' trend will turn existing IT and business models on their heads, and the time to get ready is now."

The full report is available here, and IDC and Unisys have set up a self-assessment link for businesses here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-20
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to us...
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS conf...
PUBLISHED: 2021-04-20
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions...
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...