Upload
dell
View
8.668
Download
2
Embed Size (px)
DESCRIPTION
Bring your own device policies are in place to keep both employers and employees safe. Here are few employee behaviors to watch out for via Dell’s TechPageOne http://dell.to/1ByXRLA.
Citation preview
Protect Your Company From These
BehaviorsAvoidable Employee
Presented by:
half of the companies thatallow BYOD have experienced abreach of confidential data. 1
About
Yet, of employees say their organization has no explicit BYOD guidelines. 2
30%
Employee behavior represents one of the greatest security risks for businesses.
of companies do not intend to deal with BYOD implementation or procedures. 3
40%
Behaviors That Should Be Addressed In A BYOD Policy
Use of Unauthorized Apps
The most common unauthorized applications employees access include personal email, online banking, online bill paying, online shopping andinstant messaging. 4
See as a list
Sharing Devices with Family
Allowing family members to use a BYOD device can lead to malware being downloaded or organization information being shared online. 5
See as a list
Selling Old Devices
Some employees may not think twice about selling an old device without wiping it even though it contains confidential company data. 6
See as a list
Failing to Report
About 25% of employees using BYOD encountered security problems, but only 27% report the problem to their organization. 7
25%
27%
Security Problems
Reported The Problem
See as a list
Using Public WiFi
As many as 95.6% of commuters potentially make their company’s data available to hackers by accessing sensitive data over public wifi networks. 8
See as a list
Never Testing Backed Up Data
Many organizations have attempted to use untested backup files to retrieve data aftera catastrophic failure, only to discover it has all been lost. 9
??
See as a list
Transferring Files Onto Unauthorized Devices
Employees frequently transfer sensitive files onto unauthorized devices because they are more familiar with their own device. 10
See as a list
Using Personal Email For Work
Over 60% of employees use a personal email to transmit work information, and almost one-third of these people are aware that their email account was hacked at some time.11
60%
See as a list
Unauthorized Physical Access In the United States, 46% of IT decision makers reported having to deal with employees or non-employees gaining access to restricted areas. 12
See as a list
Poor Handling of Passwords
Worldwide, one-third of employees leave computers unlocked and logged on when they leave their desks, and others leave lists of passwords around their desks. 13
See as a list
Want the latest in Tech news?Subscribe to Dell’s Tech Page One Digest
Sign me up!
www.dell.com/security
Sources:1 Kaneshige, Tom. Should CIOs Use a Carrot or a Stick to Rein in BYOD Workers? Cio.com. http://www.cio.com/article/752524/Should_CIOs_Use_a_Car-
rot_or_a_Stick_to_Rein_In_BYOD_Workers_?page=1&taxonomyId=600007
2 Freed, Anthony M. (2014, May 20). Majority of organizations have no BYOD policies.The State of Security. http://www.tripwire.com/state-of-security/top-security-sto-ries/majority-of-organizations-have-no-byod-policies-2/
3 Out-Law.com. (2013, Nov. 6). BYOD ‘not on the agenda’ at 40% of companies but expert warns against ambivalence. Out-law.com. http://www.out-law.com/en/articles/2013/november/by-od-not-on-the-agenda-at-40-of-companies-but-expert-warns-against-ambivalence/
4 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html
5 http://smallbusiness.foxbusiness.com/technology-web/2014/02/27/its-your-job-to-teach-employees-about-byod/
6 Casey, Kevin. (2012, Nov. 19). 6 Risks Your BYOD Policy Must Address. Informationweek. http://www.informationweek.com/mobile/6-risks-your-byod-policy-must-address/d/d-id/1107451?
7 Freed, Anthony M. (2014, May 20). Majority of organizations have no BYOD policies.The State of Security. http://www.tripwire.com/state-of-security/top-security-sto-ries/majority-of-organizations-have-no-byod-policies-2/
8 Kelleher, David. (2013, Sept. 19). 95.6% of comhttp://www.gfi.com/blog/survey-95-6-of-commuters-in-the-us-put-company-data-at-risk-over-free-public-wi-fi/
9 eWeek. (2011, Feb. 11). Minimize Risky Employee Behavior. http://www.eweek.com/c/a/Features/Minimize-Risky-Employee-Behavior/
10 Hess, Ken. (2014, Feb. 11). Bad behavior, no malware, puts more of your corporate data at risk. ZD Net. http://www.zdnet.com/bad-behavior-not-mal-ware-puts-more-of-your-corporate-data-at-risk-7000026129/
11 Hess, Ken. (2014, Feb. 11). Bad behavior, no malware, puts more of your corporate data at risk. ZD Net. http://www.zdnet.com/bad-behavior-not-mal-ware-puts-more-of-your-corporate-data-at-risk-7000026129/
12 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html
13 Cisco. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. http://www.cisco.com/c/en/us/solutions/collateral/enter-prise-networks/data-loss-prevention/white_paper_c11-499060.html