Employees do not respect company policy on BYOD but acknowledge risk

News by SC Staff

A third of twenty-something-year-old employees would bring their own device to work, even if there was not a BYOD policy.

A third of twenty-something-year-old employees would bring their own device to work, even if there was not a BYOD policy.

A global survey by Fortinet found that more than one in three respondents would contravene their company policy in order to bring and use their own device for work.

The survey, conducted in 15 territories of 3,872 active employees in their twenties, found that almost three-quarters (74 per cent) of respondents already regularly engage in the practice, while 55 per cent of respondents view using their device at work as a ‘right' rather than a ‘privilege'.

However 42 per cent were aware of the potential data loss and exposure to malicious IT threats from BYOD, yet this risk awareness does not prevent those workers from bypassing corporate policies. More than a third of respondents (36 per cent) admitted they have or would contravene a corporate policy banning the use of personally-owned devices for work purposes.

When asked about policies banning the use of non-approved applications, 30 per cent of all respondents admitted they have or would contravene policy. Two-thirds (66 per cent) of respondents consider themselves – not the company – to be responsible for the security of the personal devices they use for work purposes.

Patrice Perche, vice president of international sales and support for Fortinet, said: “The survey clearly reveals the great challenge faced by organisations to reconcile security and BYOD. While users want and expect to use their own devices for work, mostly for personal convenience, they do not want to hand over responsibility for security on their own devices to the organisation.

“Within such an environment, organisations must re-gain control of their IT infrastructure by strongly securing both inbound and outbound access to the corporate network and not just implement mobile device management. Organisations cannot rely on a single technology to address the security challenges of BYOD. The most effective network security strategy requires granular control over users and applications, not just devices.”

Topics:

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Upcoming Events