- Byod is here, they like companies or not
- IT teams lack visibility on all devices of the company and workers.
- The principles of zero trust limit potential damage, but few companies have still achieved it
Since ransomware and other cyber attacks dominate the owners worldwide, a new research by Ivanti states that Byod policies are not really helping.
When evaluating the state of Byod, Ivanti found that 44% use personal phones to work and 32% use their own personal computers. Three out of four IT workers agreed that Byod is common, whether their organization allows it or not.
Only half (52%) of organizations officially allow it, and when Byod is prohibited, four out of five (78%) workers still do so, which adds to the cyber risks with which companies are already fighting.
Byod weakens its cybersecurity position
With a combination of Byod, computing on the edge and in the cloud that includes the portfolios of many organizations, 38% of IT professionals admit that they lack sufficient data on the devices on their networks, a fact that is more pronounced among the IT in the shadow (45%).
Apart from personal devices, 40% of peripheral devices, such as IoT sensors, cameras and other remote equipment, are not administered. Ivanti’s investigation found that 90% of ransomware attacks begin with an unproven device.
Mike Riemer, Ciso de Campo and senior vice president of the network security group, highlighted the benefits of being aware of the updates and implementing access with minimal privileges to limit the potential damage of cyber attacks.
Ivanti’s report also explored the principles of zero confidence in cybersecurity, noting that threats can come from both the interior and outside an organization. Four fifths (79%) of IT professionals agree that the strictest access controls are vital, but for the moment only around one in three uses access to the zero confidence network (34%) and privileged access management (30%).
Although the use of VPN (62%) and the adoption of MFA (58%) are reasonably generalized, it is clear that it could work more to guarantee maximum protection against threats.
“Security and IT leaders should focus on making an inventory of all IT assets and manage them,” concluded Ivanti Security Director Daniel Spicer.
Follow Techradar on Google News and Add us as a preferred source To receive news, reviews and opinions of our experts in their feeds. Be sure to click on the Follow button!
And of course you can also Keep PakGazette in Tiktok For news, reviews, video aboxings and receive periodic updates on our part in WhatsApp also.
You may also like