In the telecommunications space, we tend to think the bring your own device (BYOD) phenomenon is a new one. While the smartphones and tablets may be newer to the scene, employees have carried their own devices for years. The difference now is the level of access granted to corporate data. As the Internet is an increasingly attractive target for malicious activity, IT managers have to take a new approach to mobility. They seem to be making it work in Australia.
According to a ZDNet, nearly nine of out 10 senior staff members already have access to corporate data by way of their personal mobile devices. It appears that among organizations there, the level of access granted depends upon the position held. For instance, while nearly all of the senior leadership team in the typical corporate environment has access, only 77 percent of middle management has the same level. For all other staff, that level drops to 64 percent.
The type of data accessed also has restrictions with BYOD users. When financial data is needed, for example, it is only available 43 percent of the time. When it comes to customer data, it can be accessed with mobile devices 56 percent of the time. Supplier data is available 57 percent of the time.
Restricted access is one form of control to ensure data is available only to those who need or it can protect it. But is this effort enough? The survey covered in ZDNet also found that security precautions are lacking. Roughly half of participants shared that their business does not have a formal or documented security policy in place. Only 17 percent reported that they are certified to ISO 27001 standards. Another 11 percent were in the process of completing certification at the time of the survey, while the remaining participants had not yet considered it.
Interestingly, these low numbers did not preclude participants from suggesting that security measures were a top method for controlling access to corporate data. In fact, 77 percent of participants suggested they use an “acceptable use” policy to guide employees as to what they can and cannot do with their mobile devices. Respondents also require the use of passwords when connecting to the network, with 77 percent using this method to reduce the risk.
As BYOD continues to enjoy growth, the use of security measures continues to be lacking. Secure containers are used by only 28 percent of respondents and data encryption is only used by 43 percent. Only 46 percent are using any type of mobile device management to ensure safe and productive use.
These numbers are likely to change over time as companies continue to embrace BYOD and understand what needs to be in place for successful use. Until then, let’s hope their data is safe.