Risky BYOD Employee Behaviors
-
Upload
dell -
Category
Devices & Hardware
-
view
8.667 -
download
2
description
Transcript of Risky BYOD Employee Behaviors
Protect Your Company From These
BehaviorsAvoidable Employee
Presented by:
half of the companies thatallow BYOD have experienced abreach of confidential data. 1
About
Yet, of employees say their organization has no explicit BYOD guidelines. 2
30%
Employee behavior represents one of the greatest security risks for businesses.
of companies do not intend to deal with BYOD implementation or procedures. 3
40%
Behaviors That Should Be Addressed In A BYOD Policy
Use of Unauthorized Apps
The most common unauthorized applications employees access include personal email, online banking, online bill paying, online shopping andinstant messaging. 4
See as a list
Sharing Devices with Family
Allowing family members to use a BYOD device can lead to malware being downloaded or organization information being shared online. 5
See as a list
Selling Old Devices
Some employees may not think twice about selling an old device without wiping it even though it contains confidential company data. 6
See as a list
Failing to Report
About 25% of employees using BYOD encountered security problems, but only 27% report the problem to their organization. 7
25%
27%
Security Problems
Reported The Problem
See as a list
Using Public WiFi
As many as 95.6% of commuters potentially make their company’s data available to hackers by accessing sensitive data over public wifi networks. 8
See as a list
Never Testing Backed Up Data
Many organizations have attempted to use untested backup files to retrieve data aftera catastrophic failure, only to discover it has all been lost. 9
??
See as a list
Transferring Files Onto Unauthorized Devices
Employees frequently transfer sensitive files onto unauthorized devices because they are more familiar with their own device. 10
See as a list
Using Personal Email For Work
Over 60% of employees use a personal email to transmit work information, and almost one-third of these people are aware that their email account was hacked at some time.11
60%
See as a list
Unauthorized Physical Access In the United States, 46% of IT decision makers reported having to deal with employees or non-employees gaining access to restricted areas. 12
See as a list
Poor Handling of Passwords
Worldwide, one-third of employees leave computers unlocked and logged on when they leave their desks, and others leave lists of passwords around their desks. 13
See as a list
Want the latest in Tech news?Subscribe to Dell’s Tech Page One Digest
Sign me up!
www.dell.com/security
Sources:1 Kaneshige, Tom. Should CIOs Use a Carrot or a Stick to Rein in BYOD Workers? Cio.com. http://www.cio.com/article/752524/Should_CIOs_Use_a_Car-
rot_or_a_Stick_to_Rein_In_BYOD_Workers_?page=1&taxonomyId=600007
2 Freed, Anthony M. (2014, May 20). Majority of organizations have no BYOD policies.The State of Security. http://www.tripwire.com/state-of-security/top-security-sto-ries/majority-of-organizations-have-no-byod-policies-2/
3 Out-Law.com. (2013, Nov. 6). BYOD ‘not on the agenda’ at 40% of companies but expert warns against ambivalence. Out-law.com. http://www.out-law.com/en/articles/2013/november/by-od-not-on-the-agenda-at-40-of-companies-but-expert-warns-against-ambivalence/
4 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html
5 http://smallbusiness.foxbusiness.com/technology-web/2014/02/27/its-your-job-to-teach-employees-about-byod/
6 Casey, Kevin. (2012, Nov. 19). 6 Risks Your BYOD Policy Must Address. Informationweek. http://www.informationweek.com/mobile/6-risks-your-byod-policy-must-address/d/d-id/1107451?
7 Freed, Anthony M. (2014, May 20). Majority of organizations have no BYOD policies.The State of Security. http://www.tripwire.com/state-of-security/top-security-sto-ries/majority-of-organizations-have-no-byod-policies-2/
8 Kelleher, David. (2013, Sept. 19). 95.6% of comhttp://www.gfi.com/blog/survey-95-6-of-commuters-in-the-us-put-company-data-at-risk-over-free-public-wi-fi/
9 eWeek. (2011, Feb. 11). Minimize Risky Employee Behavior. http://www.eweek.com/c/a/Features/Minimize-Risky-Employee-Behavior/
10 Hess, Ken. (2014, Feb. 11). Bad behavior, no malware, puts more of your corporate data at risk. ZD Net. http://www.zdnet.com/bad-behavior-not-mal-ware-puts-more-of-your-corporate-data-at-risk-7000026129/
11 Hess, Ken. (2014, Feb. 11). Bad behavior, no malware, puts more of your corporate data at risk. ZD Net. http://www.zdnet.com/bad-behavior-not-mal-ware-puts-more-of-your-corporate-data-at-risk-7000026129/
12 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html
13 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html