If 72% of organizations are supporting BYOD for all or some of their employees, you would expect a similar figure for controlling data security on those devices? Sadly, this ideal still remains elusive. A new report suggests that while BYOD is nearing universal acceptance, basic precautions such as encryption, remote wipe or mobile application management, to name a few, remain elusive for many organizations. And yet, there are signs that the tide is turning and the percentage of organizations attempting to protect data on the endpoint are on the rise.
The report, How Forward-Looking Industries Secure BYOD, surveyed 800 cybersecurity professionals and IT leaders across five major industries: healthcare, financial services, tech, government and education. The survey reveals a variety of insights into endpoint security strategies in an age of personal devices.
- 72% or organizations support BYOD, the highest in the financial sector (74%) and lowest in government (54%)
- Fewer than 60% of financial services organizations have remote wipe or encryption capabilities for BYOD devices (despite regulations that require these)
- Higher education has the greatest lag in enforcing risk-control measures with only 18% having access controls and only 29% with remote wipe capabilities
- Encryption on the endpoint is lagging, with only 36% of educational institutions, 56% of educational institutions and 57% of healthcare organizations supporting device encryption
In all sectors, it was noted that BYOD had the potential to enable greater productivity and employee satisfaction, though privacy and security / compliance remained the greatest concern. As we’ve noted before, as much as 45% of corporate data resides on the endpoint, so gaining visibility into both the data and the device remains a crucial step toward improving data security.
Luckily, Absolute just launched a revolutionary product to help gain visibility into the endpoint. With the release of Absolute DDS 6, we have launched our Endpoint Data Discovery (EDD) feature allowing you to see where your sensitive data is, at any time, on or off the network, with remote abilities to check the status of security oversight (such as encryption) or to lock down devices or wipe this data. As a part of your data security planning, knowing where your data lives gives you the context you need to address compliance with data security policies, addressing the Insider Threat, or to remediate a data security incident (such as a lost device) before it becomes a full-scale data breach. To learn more, download our data sheet.