BYOD – the security risks
employees are bringing their favourite devices into work. It may be good for
       morale, but could your sensitive corporate data be at risk?
driven by employee choice, bring-your-own-device (BYOD) policies are
                   changing the work environment




             425 million smartphones                     companies permitting
               were bought in 2011                             BYOD

                          smartphone   PC




sales                                       60%
                                            companies
(millions)                                  permitting
                                              BYOD
safe and secure?




1.3 million phones stolen each year                      over half of stolen laptops
                                                         already result in a data breach



                                                         29%                        71%
                                                           no                       yes

500 samples of Android malware                           have mobile devices contributed
today, „thousands‟ more this year.
                                                         to increased security incidents?
Google releases Bouncer to auto-
scan for malware in App Market.
security matters. you need to be aware of the risks.

laying down the house rules                                      half of companies allow any
while keeping the kids happy                                     employee device to access
                                                                 corporate systems – frightening!

                                                25%
         password enforcement                   allow no
         remote kill/wipe of devices
                                                devices                             51%
                                                                                   allow any
         administrative “back-door” access      24%                                 device
                                                allow only
         compliance with devices or original    compliant
         software/hardware requirements          devices
         granular management of consumer                        given the risk of data breach, many firms
         vs. business information and                           lack a mobile device security policy
         applications                                           do you have a mobile security policy?

                                                27%
                                                                                        3%
                                                   no                                 don‟t know
                $3,010 - $179,270
               potential cost of unauthorised    17%
               access to data held on lost or
                                                  yes                                 53%
               stolen devices
                                                 but it‟s not                           yes
                                                  enforced
pros and cons: is BYOD worth the hassle?

an iPass survey of 1,100 mobile workers                Cisco‟s company-wide any device policy
worldwide showed workers who use mobile                has delivered productivity gains equal to
devices for both work and personal matters put         30 minutes per employee per day
in 240 more hours than those who do not




                                                                             30+
                                                                             minutes

                                                                          $2-$10/device/month
many enterprises use Mobile Device
Management (MDM) software to set                                          MDM prices vary widely,
and enforce a single security policy                                      but expect to pay this much,
across different types of devices.                                        says Philippe Winthrop
                                                                          Enterprise Mobility Forum
do you use MDM software to                                                MD in May 2011
enforce security across devices?


   6%                                  35%
 don‟t know                             yes
  25%                                  25%
                                   not yet,
    no                                  but we‟re
 and we have                           evaluating /
  no plans to                            piloting
Morgan Stanley, Forrester, Aberdeen
Group, IDC, Continental
Research, Websense, Dimension Data, Yankee
Group, Information Week Analytics, iPass, Cisco.

More Related Content

PPTX
Mobile Security
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
2010: Mobile Security - Intense overview
PPTX
Mobile security
PDF
Mobile Security 101
PDF
Leaky Mobile Apps: What You Need to Know
PDF
Vetting Mobile Apps for Corporate Use: Security Essentials
PDF
Mobile Security for Smartphones and Tablets
Mobile Security
C0c0n 2011 mobile security presentation v1.2
2010: Mobile Security - Intense overview
Mobile security
Mobile Security 101
Leaky Mobile Apps: What You Need to Know
Vetting Mobile Apps for Corporate Use: Security Essentials
Mobile Security for Smartphones and Tablets

What's hot (20)

PPTX
Accellion - The European Information Security Summit, London
PDF
Sholove cyren web security - technical datasheet2
PDF
Mobile security - Intense overview
PPTX
Top 2016 Mobile Security Threats and your Employees
PDF
IRJET- Android Device Attacks and Threats
PPTX
IoT advatage and disadvantage
PPTX
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
PDF
The New NotCompatible
PDF
Feds: You have a BYOD program whether you like it or not
PDF
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
PDF
The state of mobile app security
PDF
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
PDF
White Paper: Mobile Security
PPTX
Tips and Tricks on Securing your Android Devices
PDF
Ten Expert Tips on Internet of Things Security
PDF
2015 Cybersecurity Predictions
PDF
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
PPTX
Secure mobile content SharePoint Best Practices Conference 2013
PDF
2012 State of Mobile Survey Global Key Findings
PDF
5 Ways to Protect your Mobile Security
Accellion - The European Information Security Summit, London
Sholove cyren web security - technical datasheet2
Mobile security - Intense overview
Top 2016 Mobile Security Threats and your Employees
IRJET- Android Device Attacks and Threats
IoT advatage and disadvantage
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
The New NotCompatible
Feds: You have a BYOD program whether you like it or not
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
The state of mobile app security
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
White Paper: Mobile Security
Tips and Tricks on Securing your Android Devices
Ten Expert Tips on Internet of Things Security
2015 Cybersecurity Predictions
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
Secure mobile content SharePoint Best Practices Conference 2013
2012 State of Mobile Survey Global Key Findings
5 Ways to Protect your Mobile Security
Ad

Similar to BYOD Security Risks for Business (20)

PPTX
PPTX
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PPTX
BYOD Industry Trends and Best Practices - Philly Tech Week
PDF
The impact of mobile devices on information security
PDF
Mobile Device Management Service: Yamana
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PDF
Securing mobile devices 1
PDF
Securing mobile devices_in_the_business_environment
PDF
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
PDF
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
PDF
Managing Mobile Business Insecurities
PDF
Paper Florencio Cano - Patient data security in a wireless and mobile world
PDF
Security White Paper
PDF
MobileSecurityInfographic_v3
PPTX
Top Risks of Enterprise Mobility
PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PDF
Cybersecurity in the Age of Mobility
PDF
Symantec Mobile Security Webinar
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
BYOD Industry Trends and Best Practices - Philly Tech Week
The impact of mobile devices on information security
Mobile Device Management Service: Yamana
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Securing mobile devices 1
Securing mobile devices_in_the_business_environment
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Managing Mobile Business Insecurities
Paper Florencio Cano - Patient data security in a wireless and mobile world
Security White Paper
MobileSecurityInfographic_v3
Top Risks of Enterprise Mobility
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Cybersecurity in the Age of Mobility
Symantec Mobile Security Webinar
Ad

More from Orange Business Services (20)

PDF
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
PPTX
Asia-Pacific: smart mobility for the public sector with Orange
PPTX
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
PPTX
How to deliver faster AI insights while safeguarding data security and privacy?
PDF
Building the connected Supply Chain – how digital is transforming Asia-Pacific
PDF
How digital is transforming financial services in Asia Pacific
PDF
Digitally transforming the Asia Pacific building construction industry
PPTX
SDN/NFV: Create a network that’s ahead of your business
PPTX
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
PPTX
World café people and digital supports ppt interventions plénières villageby_...
PPTX
Orange Data Centre and Cloud
PPT
Skype Entreprise, tremplin de la transformation digitale ?
PPTX
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
PPTX
Internet des Objets et Big data pour les assurances : la révolution est en ma...
PPTX
Digitally transforming transport and logistics
PPTX
Smart cities - leading the way towards Digital India
PPTX
Digging deep - the digital transformation of mining
PPTX
Retail therapy - the digital transformation of shopping
PDF
[White Paper] Are containers the future ?
PPTX
[infographie] Comment optimiser la gestion des déchets ?
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
Asia-Pacific: smart mobility for the public sector with Orange
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
How to deliver faster AI insights while safeguarding data security and privacy?
Building the connected Supply Chain – how digital is transforming Asia-Pacific
How digital is transforming financial services in Asia Pacific
Digitally transforming the Asia Pacific building construction industry
SDN/NFV: Create a network that’s ahead of your business
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café people and digital supports ppt interventions plénières villageby_...
Orange Data Centre and Cloud
Skype Entreprise, tremplin de la transformation digitale ?
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Digitally transforming transport and logistics
Smart cities - leading the way towards Digital India
Digging deep - the digital transformation of mining
Retail therapy - the digital transformation of shopping
[White Paper] Are containers the future ?
[infographie] Comment optimiser la gestion des déchets ?

Recently uploaded (20)

PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPTX
Neurology of Systemic disease all systems
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
IT infrastructure and emerging technologies
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PPTX
Reproductive system-Human anatomy and physiology
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPT
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PPTX
Neurological complocations of systemic disease
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PDF
anganwadi services for the b.sc nursing and GNM
PDF
Laparoscopic Dissection Techniques at WLH
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Theoretical for class.pptxgshdhddhdhdhgd
Neurology of Systemic disease all systems
Nurlina - Urban Planner Portfolio (english ver)
IT infrastructure and emerging technologies
Disorder of Endocrine system (1).pdfyyhyyyy
Diabetes Mellitus , types , clinical picture, investigation and managment
Reproductive system-Human anatomy and physiology
0520_Scheme_of_Work_(for_examination_from_2021).pdf
UNIT_2-__LIPIDS[1].pptx.................
Acidosis in Dairy Herds: Causes, Signs, Management, Prevention and Treatment
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PLASMA AND ITS CONSTITUENTS 123.pptx
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Neurological complocations of systemic disease
hsl powerpoint resource goyloveh feb 07.ppt
2025 High Blood Pressure Guideline Slide Set.pptx
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
anganwadi services for the b.sc nursing and GNM
Laparoscopic Dissection Techniques at WLH
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx

BYOD Security Risks for Business

  • 1. BYOD – the security risks employees are bringing their favourite devices into work. It may be good for morale, but could your sensitive corporate data be at risk?
  • 2. driven by employee choice, bring-your-own-device (BYOD) policies are changing the work environment 425 million smartphones companies permitting were bought in 2011 BYOD smartphone PC sales 60% companies (millions) permitting BYOD
  • 3. safe and secure? 1.3 million phones stolen each year over half of stolen laptops already result in a data breach 29% 71% no yes 500 samples of Android malware have mobile devices contributed today, „thousands‟ more this year. to increased security incidents? Google releases Bouncer to auto- scan for malware in App Market.
  • 4. security matters. you need to be aware of the risks. laying down the house rules half of companies allow any while keeping the kids happy employee device to access corporate systems – frightening! 25% password enforcement allow no remote kill/wipe of devices devices 51% allow any administrative “back-door” access 24% device allow only compliance with devices or original compliant software/hardware requirements devices granular management of consumer given the risk of data breach, many firms vs. business information and lack a mobile device security policy applications do you have a mobile security policy? 27% 3% no don‟t know $3,010 - $179,270 potential cost of unauthorised 17% access to data held on lost or yes 53% stolen devices but it‟s not yes enforced
  • 5. pros and cons: is BYOD worth the hassle? an iPass survey of 1,100 mobile workers Cisco‟s company-wide any device policy worldwide showed workers who use mobile has delivered productivity gains equal to devices for both work and personal matters put 30 minutes per employee per day in 240 more hours than those who do not 30+ minutes $2-$10/device/month many enterprises use Mobile Device Management (MDM) software to set MDM prices vary widely, and enforce a single security policy but expect to pay this much, across different types of devices. says Philippe Winthrop Enterprise Mobility Forum do you use MDM software to MD in May 2011 enforce security across devices? 6% 35% don‟t know yes 25% 25% not yet, no but we‟re and we have evaluating / no plans to piloting
  • 6. Morgan Stanley, Forrester, Aberdeen Group, IDC, Continental Research, Websense, Dimension Data, Yankee Group, Information Week Analytics, iPass, Cisco.