- Security TWENTY
- Women in Security
UK and US businesses are in a state of uncertainty around if, and how, to protect their networks against the threats brought about by mobile devices entering the workplace. That is according to research by Tenable Network Security, Inc, a Unified Security Monitoring (USM product firm. Both nations strongly agreed that mobile devices pose a significant threat to their business (UK: 93 per cent, US: 96pc). Despite this however, a high proportion of each nation said they had no clear way of identifying ‘known’ mobile threats that could be attacking their network (UK: 44pc, US: 47pc).
A national divide becomes apparent when looking at how respondents were controlling the connection of their employee’s own devices to the network. Some 63pc of UK businesses have a defined written policy around Bring Your Own Device (BYOD) which employees followed, whereas only 22pc of Americans could say the same.The research, undertaken at two major security events in the US and UK – RSA Conference 2012 and Infosecurity Europe – suggested that 31pc of US businesses did have BYOD policies in place but their employees actively ignored it.
The countries agreed that mobile security held an ‘important’ place on their priority lists for 2012 – 60pc of UK respondents and 55pc of Americans – with over a third of both nations regarding it as their ‘top’ security priority. However, 35pc of US companies and 22pc of British organisations were not controlling mobile device usage on their network at all.
“There seems to be a contradictive disconnect between the perceived mobile threat, and the actions being taken by businesses on both sides of the pond,” said Ron Gula, CEO and CTO at Tenable Network Security.
“Despite the UK having a slight step up on US firms, with more employees acknowledging the BYOD policies in place, many of the figures remain worrying. Smart devices entering the workplace represent a combination of opportunity and threat; so organisations must understand the bigger picture of where information rests and flows within the network.
“When it comes to mobile security, all smartphones and tablets share a common set of challenges: they carry lots of data; they are often riding around in someone’s pocket where they can be easily misplaced; they transfer data over a network that can be intercepted; and they run applications that may or may not be well written. Placing important data on a mobile device where it’s easy to lose, steal, or rootkit offers the same problem as uncontrolled laptops, only worse.”
“The IT network management environment is only going to become more complex and challenging, both internally and externally – so businesses must ensure that they can see what’s happening at every moment before something happens that they weren’t expecting.”
For more information on Tenable Network Security visit: www.tenable.com.