Employee Devices: Prime Cybercrime Entry Point?

hacked message and skull of death on smartphone screenMore than half of employees are walking around with a potential security breach in their pockets – or on their wrists. How can organizations mitigate these threats?

According to research conducted with more than 4,500 responses across 20 geographic markets, 47% of employees use their own smartphone to access corporate data, along with 25% who use their own tablet and 8% using wearables like the Apple Watch. In fact, 41% said they use three or mobile devices for work daily.

But less than 30% of employees who use their own devices have any kind of security software installed. That makes these devices a prime exposure point for cybercriminals looking to attack business systems.

The report points to organizations’ need to treat employee personal devices as a security concern outside of the traditional perimeter, rather than simply an extension of current strategies.

Add “employee Apple Watches” to the never-ending list of threats that could compromise systems and data. You can learn about your responsibilities, the benefits and drawbacks of the tools and processes available to you, and how your organization can increase its preparedness, with DRI’s IT/DR Planning workshop. Over the two-day course, you’ll come away with the skills you need to create an IT/DR project plan and gain management approval for it. Click here for more information, or call 866-542-3744.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s