{"id":15001,"date":"2014-09-08T16:42:03","date_gmt":"2014-09-08T16:42:03","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2522"},"modified":"2020-02-26T10:55:26","modified_gmt":"2020-02-26T15:55:26","slug":"stolen-mobile-devices-how-much-of-this-is-personal-business","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/stolen-mobile-devices-how-much-of-this-is-personal-business\/15001\/","title":{"rendered":"Stolen mobile devices: how much of this is personal business?"},"content":{"rendered":"<p>It\u2019s an open secret that Bring Your Own Device paradigm created a lot of problems for IT staff in companies. But there are even more profound and thought-provoking paradoxes emerging these days. One of them is \u201cshared responsibility\u201d for the mobile devices used for both personal and working needs, which outright borders with \u201cshared ownership\u201d.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>What is that about? Among many other findings of <a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Global_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab\u2019s 2014 IT Security Risks<\/a> survey it is reported that employees tend <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/Kaspersky-Lab-Survey-Shows-Employees-are-Slow-to-Report-Stolen-Mobile-Devices\" target=\"_blank\" rel=\"noopener nofollow\">to be slow to report losing mobile devices to their superiors and\/or IT staff<\/a>.<\/p>\n<p>Some may ask, should they report such incidents at all? If it is their own device, it\u2019s their own business. <\/p><blockquote class=\"twitter-pullquote\"><p>Stolen mobile devices: how much of this is personal business?\u00a0#BYOD<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fsu2G&amp;text=+Stolen+mobile+devices%3A+how+much+of+this+is+personal+business%3F%C2%A0%23BYOD\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Actually, the survey does not mention whether those are personal or enterprise-owned devices. But this difference becomes a bit vague once the device is being used for working needs and working documents are stored inside it. From there on, safeguarding the device and data on it becomes a responsibility shared between the owner himself and the employing entity\u2019s IT department, which is tasked with data protection.<\/p>\n<p>Of course, in most cases lost or stolen devices are just lost or even \u201cjust stolen\u201d \u2013 in a latter case it is a device itself that a thief is interested in, not sensitive data stored inside. However, extra malice \u2013 and thus a serious data leak \u2013 cannot be outright excluded.<\/p>\n<p>It is no surprise that IT people are worried that it takes two (in 38% of cases), or even three to five days (9%) for employees to report a missing device. And while the numbers of lost phones or tablets (or getting them stolen) is climbing, the percentage of employees who notified their employers the same day the incident occurred decreased from 60% to 50% from 2013 to 2014.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020123\/wide-2-1.png\"><img decoding=\"async\" class=\"alignleft size-full wp-image-2524\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020123\/wide-2-1.png\" alt=\"wide-2\" width=\"1000\" height=\"500\"><\/a><\/p>\n<p>A smartphone today is an easy-to-obtain commodity, so losing it is already considered a common annoyance, not a world-wide drama. Thus employees are slow to report the loss \u2013 it doesn\u2019t seem like something extra important to them.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#BYOD brings a problem of shared responsibility for a mobile device.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fsu2G&amp;text=%23BYOD+brings+a+problem+of+shared+responsibility+for+a+mobile+device.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>That adds a extra bit of headache to the IT staff: 52% of survey respondents indicated they are \u201cmore concerned about mobile\u201d than in previous years. In fact, 43% went further, saying that mobile working patterns introduce too much risk,\u201d despite the obvious productivity benefits these devices can bring to the business. Another 42% believe that \u201cBYOD (Bring Your Own Device) mobile policies present an \u201cincreased security risk\u201d for businesses.<\/p>\n<p>Still it is clear that BYOD is here to stay. So the best thing to do here is to make it clear to the employees: If they use their personal devices for work and store any sensitive data in them, IT staff has to know what\u2019s going on with it to react to trouble promptly \u2013 before the data \u201cchanges hands\u201d. It\u2019s not an attempt to control the employees\u2019 property, it\u2019s about safeguarding the business\u2019 data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT staff of various companies complain that employees are slow to report losing their mobile devices. Thanks to BYOD, the responsibility for those devices now appears to be shared.<\/p>\n","protected":false},"author":209,"featured_media":15818,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[415,298,2042,423,2175,2125],"class_list":{"0":"post-15001","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-byod","10":"tag-it-security","11":"tag-it-threats","12":"tag-mobile-devices","13":"tag-personal-devices","14":"tag-very-small-businesses"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/stolen-mobile-devices-how-much-of-this-is-personal-business\/15001\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/stolen-mobile-devices-how-much-of-this-is-personal-business\/15001\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/stolen-mobile-devices-how-much-of-this-is-personal-business\/15001\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/byod\/","name":"BYOD"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15001"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15001\/revisions"}],"predecessor-version":[{"id":33310,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15001\/revisions\/33310"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15818"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}