SlideShare uma empresa Scribd logo
1 de 24
B.Y.O.D. 
THE BRING-YOUR-OWN-DEVICE TREND HAS ESCALATED OVER THE YEARS AS EMPLOYEES HAVE 
BEGUN TO OWN BETTER IT EQUIPMENT THAN WHAT THEIR EMPLOYER PROVIDES
60% 
HAVE USED A PERSONAL 
DEVICE FOR WORK 
BY 2018, OVER 
1 BILLION 
EMPLOYEES WILL HAVE 
AN EMPLOYEE-OWNED 
SMARTPHONE OR TABLET
THE BYOD HAS PROVEN TO BE BENEFICIAL BECAUSE IT HAD RESULTED IN: 
HAPPIER EMPLOYEES: 
9 IN 10 
WORKERS AT BUSINESSES 
WITHOUT BYOD POLICIES 
ARE UNHAPPY WITH THEIR DEVICES 
MORE PRODUCTIVE 
EMPLOYEES: 
57% 
SAID IT IMPROVED 
PRODUCTIVITY
WHILE THERE ARE MANY 
BENEFITS TO BYOD, THE 
RISKS CANNOT BE IGNORED. 
CHECK OUT THESE 
8 BYOD 
SECURITY TIPS
TIP #1: 
PREPARE FOR THESE DEVICES TO BE LOST OR 
STOLEN.
25% 
(OVER 6 MILLION) 
MOBILE DEVICES WERE EITHER LOST OR 
STOLEN 
2007-2011: 
MOBILE PHONE THEFT INCREASED BY 
54% 
40% 
OF NYC ROBBERIES INVOLVED 
SMARTPHONES
IN A 12-MONTH PERIOD IN 7 AIRPORTS, OVER 
7,000+ DEVICES WERE LOST 
3,576 
LAPTOPS 
THESE DEVICES WERE GENERALLY EITHER DONATED TO CHARITIES OR SENT TO ANOTHER LOCATION 
3,444 
SMARTPHONES 
AND TABLETS
TIP #2: 
BACK-UP THE DATA.
29% 
OF BUSINESSES 
LOST CRITICAL DATA 
THROUGH A BYOD 
SECURITY BREACH
TIP #3: 
CREATE A COMPREHENSIVE 
BYOD POLICY.
60%-80% 
BUSINESSES HAVE NO FORMAL BYOD POLICY
TIP #4: 
ENFORCE YOUR BYOD POLICY.
OVER 50% 
OF SURVEYED RESPONDENTS PLAN 
TO IGNORE BYOD POLICIES
TIP #5: 
KEEP TECH SUPPORT OPEN.
BY 2016, BYOD TECH SUPPORT REQUESTS WILL DROP 
25-35% 
14% 
WOULDN’T TELL THEIR EMPLOYER 
IF A PERSONAL DEVICE USED FOR WORK PURPOSES WAS 
COMPROMISED
TIP #6: 
DON’T LIMIT THE POLICY TO JUST 
MOBILE DEVICES.
36% 
USE PERSONAL CLOUD STORAGE
TIP #7: 
SET BOUNDARIES.
ISSUE CLEAR RULES AND GUIDANCE REGARDING: 
SECURE DATA STORAGE 
SECURITY EXPECTATIONS 
COMPANY ACCESS TO DATA 
OWNERSHIP OF INFORMATION
TIP #8: 
CREATE A SECURE IT ASSET DISPOSAL PROGRAM.
ON AVERAGE, COMPANIES ARE HIT WITH A DATA BREACH 
2 MILLION 
TIMES PER WEEK
CONTACT SIMS RECYCLING SOLUTIONS, THE GLOBAL LEADER 
IN ELECTRONICS REUSE AND RECYCLING, TO GET STARTED ON 
YOUR IT ASSET DISPOSITION PROGRAM AT 800.270.8220 OR 
US.SIMSRECYCLING.COM/BUSINESS/ITAD.

Mais conteúdo relacionado

Mais procurados

E news share market app
E news share market appE news share market app
E news share market app
appsme
 
Cell Phones&Driving[1]
Cell Phones&Driving[1]Cell Phones&Driving[1]
Cell Phones&Driving[1]
guesta0b3eb
 

Mais procurados (14)

A Day In the Life of the Modern Smartphone User [Infographic]
A Day In the Life of the Modern Smartphone User [Infographic]A Day In the Life of the Modern Smartphone User [Infographic]
A Day In the Life of the Modern Smartphone User [Infographic]
 
26 Mobile and Social Media Statistics 2014
26 Mobile and Social Media Statistics 2014 26 Mobile and Social Media Statistics 2014
26 Mobile and Social Media Statistics 2014
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
E news share market app
E news share market appE news share market app
E news share market app
 
Mary meeker's report 2016
Mary meeker's report 2016Mary meeker's report 2016
Mary meeker's report 2016
 
CIW China Internet Insights 2015
CIW China Internet Insights 2015CIW China Internet Insights 2015
CIW China Internet Insights 2015
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Douglas Nicol's (On Message) presentation at Mumbrella Travel Marketing Summit
Douglas Nicol's (On Message) presentation at Mumbrella Travel Marketing SummitDouglas Nicol's (On Message) presentation at Mumbrella Travel Marketing Summit
Douglas Nicol's (On Message) presentation at Mumbrella Travel Marketing Summit
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
Between 2013 @Capri - The Power of Connections
Between 2013 @Capri - The Power of ConnectionsBetween 2013 @Capri - The Power of Connections
Between 2013 @Capri - The Power of Connections
 
test
testtest
test
 
Big data hype (and reality)
Big data hype (and reality)Big data hype (and reality)
Big data hype (and reality)
 
Cell Phones&Driving[1]
Cell Phones&Driving[1]Cell Phones&Driving[1]
Cell Phones&Driving[1]
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 

Semelhante a 8 BYOD Security Tips

iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...
iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...
iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...
Health IT Conference – iHT2
 

Semelhante a 8 BYOD Security Tips (20)

Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
The IT community's take on Artificial Intelligence
The IT community's take on Artificial IntelligenceThe IT community's take on Artificial Intelligence
The IT community's take on Artificial Intelligence
 
The Workplace of Things
The Workplace of ThingsThe Workplace of Things
The Workplace of Things
 
The Intersection of Trust, Data Security and the Financial Industry
The Intersection of Trust, Data Security and the Financial IndustryThe Intersection of Trust, Data Security and the Financial Industry
The Intersection of Trust, Data Security and the Financial Industry
 
iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...
iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...
iHT2 Health IT Summit Boston 2013 – Scott Lundstrom, Group Vice President Pre...
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Build a sustainable remote workforce​
Build a sustainable remote workforce​Build a sustainable remote workforce​
Build a sustainable remote workforce​
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
IoT: Disruption and Opportunity in the Insurance Industry
IoT: Disruption and Opportunity in the Insurance IndustryIoT: Disruption and Opportunity in the Insurance Industry
IoT: Disruption and Opportunity in the Insurance Industry
 
Our Changing Relationship with Brands - The Inversion of Influence
Our Changing Relationship with Brands - The Inversion of InfluenceOur Changing Relationship with Brands - The Inversion of Influence
Our Changing Relationship with Brands - The Inversion of Influence
 
Colombia InsurTech conference keynote _Delivered on 26 May 2019 (final)
Colombia InsurTech conference keynote _Delivered on 26 May 2019 (final)Colombia InsurTech conference keynote _Delivered on 26 May 2019 (final)
Colombia InsurTech conference keynote _Delivered on 26 May 2019 (final)
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Social Tools in the Workplace Infographic
Social Tools in the Workplace InfographicSocial Tools in the Workplace Infographic
Social Tools in the Workplace Infographic
 
Webinar on 3-D Client Value Assessment
Webinar on 3-D Client Value AssessmentWebinar on 3-D Client Value Assessment
Webinar on 3-D Client Value Assessment
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
 

Mais de Sims Recycling Solutions

Mais de Sims Recycling Solutions (7)

5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
The Cellphone Cycle
The Cellphone CycleThe Cellphone Cycle
The Cellphone Cycle
 
Recycling Safety Standards
Recycling Safety StandardsRecycling Safety Standards
Recycling Safety Standards
 
Data Center Infographic
Data Center InfographicData Center Infographic
Data Center Infographic
 
Safety Standards for Recyclers - Infographic
Safety Standards for Recyclers - InfographicSafety Standards for Recyclers - Infographic
Safety Standards for Recyclers - Infographic
 
Cellphone Cycle Infographic
Cellphone Cycle InfographicCellphone Cycle Infographic
Cellphone Cycle Infographic
 
Byod infographic
Byod infographicByod infographic
Byod infographic
 

8 BYOD Security Tips

  • 1. B.Y.O.D. THE BRING-YOUR-OWN-DEVICE TREND HAS ESCALATED OVER THE YEARS AS EMPLOYEES HAVE BEGUN TO OWN BETTER IT EQUIPMENT THAN WHAT THEIR EMPLOYER PROVIDES
  • 2. 60% HAVE USED A PERSONAL DEVICE FOR WORK BY 2018, OVER 1 BILLION EMPLOYEES WILL HAVE AN EMPLOYEE-OWNED SMARTPHONE OR TABLET
  • 3. THE BYOD HAS PROVEN TO BE BENEFICIAL BECAUSE IT HAD RESULTED IN: HAPPIER EMPLOYEES: 9 IN 10 WORKERS AT BUSINESSES WITHOUT BYOD POLICIES ARE UNHAPPY WITH THEIR DEVICES MORE PRODUCTIVE EMPLOYEES: 57% SAID IT IMPROVED PRODUCTIVITY
  • 4. WHILE THERE ARE MANY BENEFITS TO BYOD, THE RISKS CANNOT BE IGNORED. CHECK OUT THESE 8 BYOD SECURITY TIPS
  • 5. TIP #1: PREPARE FOR THESE DEVICES TO BE LOST OR STOLEN.
  • 6. 25% (OVER 6 MILLION) MOBILE DEVICES WERE EITHER LOST OR STOLEN 2007-2011: MOBILE PHONE THEFT INCREASED BY 54% 40% OF NYC ROBBERIES INVOLVED SMARTPHONES
  • 7. IN A 12-MONTH PERIOD IN 7 AIRPORTS, OVER 7,000+ DEVICES WERE LOST 3,576 LAPTOPS THESE DEVICES WERE GENERALLY EITHER DONATED TO CHARITIES OR SENT TO ANOTHER LOCATION 3,444 SMARTPHONES AND TABLETS
  • 8. TIP #2: BACK-UP THE DATA.
  • 9. 29% OF BUSINESSES LOST CRITICAL DATA THROUGH A BYOD SECURITY BREACH
  • 10. TIP #3: CREATE A COMPREHENSIVE BYOD POLICY.
  • 11. 60%-80% BUSINESSES HAVE NO FORMAL BYOD POLICY
  • 12. TIP #4: ENFORCE YOUR BYOD POLICY.
  • 13. OVER 50% OF SURVEYED RESPONDENTS PLAN TO IGNORE BYOD POLICIES
  • 14. TIP #5: KEEP TECH SUPPORT OPEN.
  • 15. BY 2016, BYOD TECH SUPPORT REQUESTS WILL DROP 25-35% 14% WOULDN’T TELL THEIR EMPLOYER IF A PERSONAL DEVICE USED FOR WORK PURPOSES WAS COMPROMISED
  • 16. TIP #6: DON’T LIMIT THE POLICY TO JUST MOBILE DEVICES.
  • 17. 36% USE PERSONAL CLOUD STORAGE
  • 18. TIP #7: SET BOUNDARIES.
  • 19. ISSUE CLEAR RULES AND GUIDANCE REGARDING: SECURE DATA STORAGE SECURITY EXPECTATIONS COMPANY ACCESS TO DATA OWNERSHIP OF INFORMATION
  • 20. TIP #8: CREATE A SECURE IT ASSET DISPOSAL PROGRAM.
  • 21.
  • 22.
  • 23. ON AVERAGE, COMPANIES ARE HIT WITH A DATA BREACH 2 MILLION TIMES PER WEEK
  • 24. CONTACT SIMS RECYCLING SOLUTIONS, THE GLOBAL LEADER IN ELECTRONICS REUSE AND RECYCLING, TO GET STARTED ON YOUR IT ASSET DISPOSITION PROGRAM AT 800.270.8220 OR US.SIMSRECYCLING.COM/BUSINESS/ITAD.