According to Kaspersky’s new 2015 Consumer Security Risks Survey, 73% of consumers use their devices primarily for working, but only 36% have implemented strong privacy settings – and 19% don’t take any precautions at all.
“The security implications of this are clear,” the report states. “Consumers who use their connected devices for work, use them more for everything. This does not just increase their own exposure to risk, but often that of their employer too.”
Employees who have been provided with devices by their companies use them for far more than work, too:
- 41% use work smartphones for shopping
- 27% make mobile payments via work devices
- 15% use work tablets to visit online dating sites
Considering the number of recent data breaches – especially those affecting dating sites Ashley Madison and Plenty of Fish – it would be a foolish organisation that does not have a policy in place to control device security.
BYOD and mobile device security
Organisations that support bring-your-own-device (BYOD) need to be especially wary of employees’ use of mobile devices to access office networks and work systems. The best way to address mobile device security risks is to have a specific policy, ideally as part of a wider information security management system.
IT Governance’s BYOD Policy Template Toolkit contains a complete, customisable BYOD policy and Acceptable Use Agreement, together with implementation guidance, and is usable either on its own or with any other ITGP documentation toolkit.
Fully up to date with the latest official guidance on data management and security from the UK’s Information Commissioner, the BYOD Policy Template Toolkit puts affordable best practice at the fingertips of CIOs and security managers everywhere.