Your company probably doesn’t care about mobile security

Your company probably doesn't care about mobile security

There have been so many data breaches in recent years that it's easy to lose count of the major cases that have been in the headlines. Over the holidays, the Target hacking fiasco left millions of consumers at risk, while the number of hospital and clinic breaches have continued to rise across the United States. 

With cyberthreats increasing, you would think IT teams would be fighting back against these savvy criminals, right? Well, based on a recent report from ITIC and KnowBe4, proper security solutions are still very much a fantasy for most organizations. 

The source found that 53 percent of companies admit they are not prepared to address a data breach.

More than ever before, employees are using connected mobile devices to work, which means corporate data is being accesses on personal devices at an incredible rate. In fact, a separate report from VMware and Forrester found that the number of anytime, anywhere mobile workers in the U.S. and Europe jumped from 15 percent in 2011 to 29 percent the following year. 

Today, the number of professionals using unprotected devices is probably much higher, and the bring-your-own-device (BYOD) trend is likely to gain even more momentum in the coming years. 

Bad BYOD security
The ITIC and KnowBe4 report shed some light on just how worrying BYOD security should be for executives and IT leaders. The source found that half of all BYOD may have been hacked in just the last year. That's an incredible rate, which should force tech security teams to sound the alarm. 

One of the primary reasons the number of BYOD-related breaches is so high is because organizations fail to institute a comprehensive plan for leveraging BYOD and telework. Instead of investing in enterprise-grade communications and file sharing solutions, many companies allow employees to treat the data landscape like the Wild West: There are no rules, and professionals are free to use whatever unapproved applications, devices and programs they so desire. 

By implementing a restrictive policy about what products and services are prohibited, businesses can reduce their risk for being the subject of a data breach. More importantly, IT leaders should have to ability to come down on professionals who don't toe the line when it comes to best security practices. Without the right enforcement, employees will be tempted to circumvent restrictions. 

The right tools can also make a big difference in mitigating security concerns. Instead of forcing employees to use consumer-grade products, companies should invest in top-grade, secure unified communications solutions that are difficult for outsiders to penetrate. 

var addthis_config = {services_compact: ‘facebook,twitter,linkedin’}