{"id":15072,"date":"2015-06-05T17:57:36","date_gmt":"2015-06-05T17:57:36","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4031"},"modified":"2020-02-26T11:01:55","modified_gmt":"2020-02-26T16:01:55","slug":"byod-practice-developed-still-immature","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/byod-practice-developed-still-immature\/15072\/","title":{"rendered":"BYOD practice: developed, still immature"},"content":{"rendered":"<p>For quite some time the BYOD paradigm had been considered an uphill trend. As with any other, one day it either rolls down or becomes an established practice. With BYOD it is apparent that it has established itself: a recent Kaspersky Lab\u2019s <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2015\/Hidden-Danger-Small-Businesses-Dismiss-Mobile-Risks-Overlooking-BYOD-Threats\" target=\"_blank\" rel=\"noopener nofollow\">study<\/a> shows that 62% of business owners and employees use personal mobile devices for work, no matter the company size. But has this practice matured?<\/p>\n<p><b>Doesn\u2019t seem so<\/b><\/p>\n<p>The same study shows that 92% of respondents keep sensitive corporate data on smartphones and tablets which they use for both work and personal activities.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#BYOD practice: developed, still immature. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FuVw4&amp;text=%23BYOD+practice%3A+developed%2C+still+immature.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>At the same time, the smaller the business is, the less its owners are concerned about mobile security. A third (32%) of small business owners and employee see absolutely no danger to their business in staff using personal mobile devices for work. The risk of data theft from an employee\u2019s mobile device is not considered a pressing concern for them, so they do not pay much attention to it.<\/p>\n<p>This is supported by the previous studies of smaller businesses\u2019 attitude towards mobile security: <a href=\"https:\/\/business.kaspersky.com\/vsb-attitude-towards-cyberthreats-dangerous-but-not-too-important\/2174\" target=\"_blank\" rel=\"noopener nofollow\">anything but a top concern<\/a>.<\/p>\n<p>Representatives of larger businesses seem more cautious about employees losing their mobile devices: 58% fear that the theft or loss of a device could damage the company. But again, it is only slightly more than\u00a0half.<\/p>\n<p>Representatives of larger businesses are more concerned about employees losing their mobile devices: 58% fear that the theft or loss of a device could damage the company.<\/p>\n<p>Six in ten (60%) are concerned about the threat of surveillance and information theft via mobile devices, but at the same time they do little to protect themselves actively and rely on their employers to do so.<\/p>\n<p><b>Outrunning the risks recognition<\/b><\/p>\n<p>It looks like the development of BYOD in the commercial sector has outrun the recognition of the risks it poses. It\u2019s worth mentioning, however, that similar risks are posed by any new \u201cinvasive species\u201d of tech, and there is nothing unseen with BYOD.<\/p>\n<p>However, one thing is somewhat unique to the current situation: \u201cOkay, business owners say, \u201cthere must be some problems with security as the IT guys tell scary stories from time to time, and they insist that there must be some protection. Fine, there are freight-loads of free solutions; they must be enough.\u201d<\/p>\n<p>That\u2019s not so. Free solutions may be good, but they mostly\u00a0provide only basic protection, which is not enough with some advanced and sophisticated mobile threats.<\/p>\n<p>The polled representatives of smaller businesses <a href=\"https:\/\/business.kaspersky.com\/vsb-attitude-towards-cyberthreats-dangerous-but-not-too-important\/2174\" target=\"_blank\" rel=\"noopener nofollow\">don\u2019t see<\/a> any added value in spending extra money on dedicated solutions. More than 80% of respondents were not interested in information about managing the information security of mobile devices.<\/p>\n<p>It\u2019s not surprising smaller businesses need to\u00a0save wherever possible and cut spending that may seem unnecessary at any given time. But information security should not be one of those expenses since sometimes a <a href=\"https:\/\/business.kaspersky.com\/how-a-single-cybersecurity-incident-can-kill-your-business\/3540\" target=\"_blank\" rel=\"noopener nofollow\">single cyberincident<\/a>\u00a0\u2013 or even such a \u201cvanilla\u201d issue as a <a href=\"https:\/\/business.kaspersky.com\/a-few-words-on-ensuring-mobile-security\/3757\" target=\"_blank\" rel=\"noopener nofollow\">lost smartphone<\/a> with precious data on it \u2013 may be enough to jeopardize the business permanently, or at least lead to serious financial losses.<\/p>\n<p>For instance, Kaspersky Lab\u2019s stats show that one in five Android users encountered a mobile threat in 2014; and 53% of such attacks were bank and SMS Trojans.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Maturation of #BYOD happens as soon as seeing \u201cthe full picture\u201d is a norm. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FuVw4&amp;text=Maturation+of+%23BYOD+happens+as+soon+as+seeing+%26%238220%3Bthe+full+picture%26%238221%3B+is+a+norm.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Maturation of BYOD will happen as soon as seeing \u201cthe full picture\u201d of it becomes the norm among the users \u2013 i.e. when people immediately consider not only advantages, but all possible risks and ways to mitigate them so that they don\u2019t meddle with the advantages.<\/p>\n<p>Among the ways of mitigation is\u00a0protective suites such as Kaspersky Lab\u2019s business products \u2013 <a href=\"https:\/\/www.kaspersky.com\/products\/business\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> and <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a>. Either include equally effective protection for both PCs (whether those are corporate or personal) and mobile devices, which is especially important for smaller businesses. Kaspersky Small Office Security allows owners to concentrate on running their business, because it is easy to use and does not require specific IT administration knowledge to protect the company network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It looks like the development of BYOD in the commercial sector has outrun the recognition of the risks it poses. It&#8217;s worth mentioning, however, that similar risks are posed by any new &#8220;invasive species&#8221; of tech, and there is nothing unseen with BYOD.<\/p>\n","protected":false},"author":209,"featured_media":15666,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[415,2302],"class_list":{"0":"post-15072","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-byod","10":"tag-protectmybiz"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/byod-practice-developed-still-immature\/15072\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/byod-practice-developed-still-immature\/15072\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/byod-practice-developed-still-immature\/15072\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/byod\/","name":"BYOD"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15072"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15072\/revisions"}],"predecessor-version":[{"id":33526,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15072\/revisions\/33526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15666"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}