dcsimg
 
 
 
 
 
 

Mobile Devices Ratchet Up Security Risks

 
 
By Samuel Greengard  |  Posted 2015-01-09 Email
 
 
 
 
 
 
 
  • Previous
    Things Get Personal
    Next

    Things Get Personal

    91% of respondents said that the number of personal devices connecting to corporate networks is growing.
 

Over the last few years, mobility has radically redefined enterprise IT. It has introduced new requirements, new demands, and the need for entirely new technology platforms and connection points. A recent report from Check Point Software Technologies and Dimensional Research, "The Impact of Mobile Devices on Information Security: a Survey of IT and Security Professionals," states that bring-your-own-device (BYOD) initiatives and other mobile tools and approaches are ratcheting up risks, as well as costs. Among other things, the global survey of 706 IT and security professionals found that about 95 percent of their organizations have mobile devices accessing their networks, but IT and security strategies are significantly lagging. What's more, many of the problems that organizations face concerning mobile security are the direct result of lax governance and careless employees. Consequently, breaches and other incidents are on the rise, and the potential exposure and impact of these events continues to grow. Here's a list of some of the key findings from the mobile security survey.

 
 
 
 
 
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit