16
Protect Your Company From These Be h a v iors Avoidable Employee

Risky BYOD Employee Behaviors

  • Upload
    dell

  • View
    8.668

  • Download
    2

Embed Size (px)

DESCRIPTION

Bring your own device policies are in place to keep both employers and employees safe. Here are few employee behaviors to watch out for via Dell’s TechPageOne http://dell.to/1ByXRLA.

Citation preview

Page 1: Risky BYOD Employee Behaviors

Protect Your Company From These

BehaviorsAvoidable Employee

Page 2: Risky BYOD Employee Behaviors

Presented by:

Page 3: Risky BYOD Employee Behaviors

half of the companies thatallow BYOD have experienced abreach of confidential data. 1

About

Yet, of employees say their organization has no explicit BYOD guidelines. 2

30%

Page 4: Risky BYOD Employee Behaviors

Employee behavior represents one of the greatest security risks for businesses.

of companies do not intend to deal with BYOD implementation or procedures. 3

40%

Page 5: Risky BYOD Employee Behaviors

Behaviors That Should Be Addressed In A BYOD Policy

Page 6: Risky BYOD Employee Behaviors

Use of Unauthorized Apps

The most common unauthorized applications employees access include personal email, online banking, online bill paying, online shopping andinstant messaging. 4

See as a list

Page 7: Risky BYOD Employee Behaviors

Sharing Devices with Family

Allowing family members to use a BYOD device can lead to malware being downloaded or organization information being shared online. 5

See as a list

Page 8: Risky BYOD Employee Behaviors

Selling Old Devices

Some employees may not think twice about selling an old device without wiping it even though it contains confidential company data. 6

See as a list

Page 9: Risky BYOD Employee Behaviors

Failing to Report

About 25% of employees using BYOD encountered security problems, but only 27% report the problem to their organization. 7

25%

27%

Security Problems

Reported The Problem

See as a list

Page 10: Risky BYOD Employee Behaviors

Using Public WiFi

As many as 95.6% of commuters potentially make their company’s data available to hackers by accessing sensitive data over public wifi networks. 8

See as a list

Page 11: Risky BYOD Employee Behaviors

Never Testing Backed Up Data

Many organizations have attempted to use untested backup files to retrieve data aftera catastrophic failure, only to discover it has all been lost. 9

??

See as a list

Page 12: Risky BYOD Employee Behaviors

Transferring Files Onto Unauthorized Devices

Employees frequently transfer sensitive files onto unauthorized devices because they are more familiar with their own device. 10

See as a list

Page 13: Risky BYOD Employee Behaviors

Using Personal Email For Work

Over 60% of employees use a personal email to transmit work information, and almost one-third of these people are aware that their email account was hacked at some time.11

60%

See as a list

Page 14: Risky BYOD Employee Behaviors

Unauthorized Physical Access In the United States, 46% of IT decision makers reported having to deal with employees or non-employees gaining access to restricted areas. 12

See as a list

Page 15: Risky BYOD Employee Behaviors

Poor Handling of Passwords

Worldwide, one-third of employees leave computers unlocked and logged on when they leave their desks, and others leave lists of passwords around their desks. 13

See as a list

Page 16: Risky BYOD Employee Behaviors

Want the latest in Tech news?Subscribe to Dell’s Tech Page One Digest

Sign me up!

www.dell.com/security

Sources:1 Kaneshige, Tom. Should CIOs Use a Carrot or a Stick to Rein in BYOD Workers? Cio.com. http://www.cio.com/article/752524/Should_CIOs_Use_a_Car-

rot_or_a_Stick_to_Rein_In_BYOD_Workers_?page=1&taxonomyId=600007

2 Freed, Anthony M. (2014, May 20). Majority of organizations have no BYOD policies.The State of Security. http://www.tripwire.com/state-of-security/top-security-sto-ries/majority-of-organizations-have-no-byod-policies-2/

3 Out-Law.com. (2013, Nov. 6). BYOD ‘not on the agenda’ at 40% of companies but expert warns against ambivalence. Out-law.com. http://www.out-law.com/en/articles/2013/november/by-od-not-on-the-agenda-at-40-of-companies-but-expert-warns-against-ambivalence/

4 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html

5 http://smallbusiness.foxbusiness.com/technology-web/2014/02/27/its-your-job-to-teach-employees-about-byod/

6 Casey, Kevin. (2012, Nov. 19). 6 Risks Your BYOD Policy Must Address. Informationweek. http://www.informationweek.com/mobile/6-risks-your-byod-policy-must-address/d/d-id/1107451?

7 Freed, Anthony M. (2014, May 20). Majority of organizations have no BYOD policies.The State of Security. http://www.tripwire.com/state-of-security/top-security-sto-ries/majority-of-organizations-have-no-byod-policies-2/

8 Kelleher, David. (2013, Sept. 19). 95.6% of comhttp://www.gfi.com/blog/survey-95-6-of-commuters-in-the-us-put-company-data-at-risk-over-free-public-wi-fi/

9 eWeek. (2011, Feb. 11). Minimize Risky Employee Behavior. http://www.eweek.com/c/a/Features/Minimize-Risky-Employee-Behavior/

10 Hess, Ken. (2014, Feb. 11). Bad behavior, no malware, puts more of your corporate data at risk. ZD Net. http://www.zdnet.com/bad-behavior-not-mal-ware-puts-more-of-your-corporate-data-at-risk-7000026129/

11 Hess, Ken. (2014, Feb. 11). Bad behavior, no malware, puts more of your corporate data at risk. ZD Net. http://www.zdnet.com/bad-behavior-not-mal-ware-puts-more-of-your-corporate-data-at-risk-7000026129/

12 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html

13 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html