- BYOD is now widespread and security teams are finding it difficult to cope with, reports claim.
- Peripherals remain vulnerable as studies show that 40% of them are unmanaged across companies.
- Zero trust implementation lags as employees continue to use personal devices despite company policy
Bring your own device (BYOD) in workplaces is becoming the rule rather than the exception. new research from Ivanti stated.
The company found that personal phones, laptops and hotspots were increasingly being used for work tasks, often outside the control of IT departments.
The study found that nearly half (44%) of workers used their personal phone for work, 37% used it as a hotspot, and 32% used their own computer.
BYOD regardless of policy
Three in four IT workers said bringing your own device is common, despite only 52% of organizations officially allowing it.
Where policy prohibits it, 78% of employees do it anyway.
The lack of controls left companies potentially vulnerable. Microsoft data shows that more than 90% ransomware incidents begin with an unmanaged device.
Ivanti's research confirms this: 38% of IT professionals admit that they do not have sufficient data about the devices on their networks.
Peripherals, from smart cameras to remote sensors, increase exposure even further.
According to the report, about 40% of such devices remain unmanaged.
“To protect enterprise networks from edge device vulnerabilities, organizations must update peripheral devices to the latest version and perform security audits on the user endpoint,” said Mike Riemer, senior vice president of the network security group and field director of information security at Ivanti.
Zero trust models are also lagging behind adoption expectations.
79% of IT professionals believe access control is more important when employees work remotely, but only 34% of companies use zero trust network access and only 30% use privileged access control.
Daniel Spicer, chief security officer at Ivanti, said: “IT and security leaders should focus on inventorying and managing all IT assets. This means discovering all existing devices, enforcing a clear BYOD policy, and ensuring that the BYOD policy includes the ability to manage a device that was not purchased by the company itself.”
The report concludes that traditional perimeters are no longer effective and that companies need to extend control to all devices, wherever they are located, and use identity-based access controls.
Follow TechRadar on Google News. And add us as your preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the “Subscribe” button!
And of course you can also Follow TechRadar on TikTok. for news, reviews, unboxing videos and get regular updates from us on whatsapp too much.