BYOD and edge devices may be causing more security headaches for your business

Hands typing on a keyboard surrounded by security icons
(Image credit: Shutterstock)

  • BYOD is here, whether companies like it or not
  • IT teams lack visibility across all company and worker devices
  • Zero trust principles limit the damage potential, yet few companies are there yet

With ransomware and other cyberattacks dominating headlines globally, new Ivanti research claims BYOD policies really aren’t helping.

Assessing the state of BYOD, Ivanti found that 44% use personal phones for work and 32% use their own personal computers. Three in four IT workers agreed BYOD is common, whether their organization allows it or not.

Only half (52%) of organizations officially allow it, and where BYOD is banned, four in five (78%) workers still do it, adding to the cyber risks that companies are already battling with.

BYOD weakens your cybersecurity posture

With an amalgamation of BYOD, edge and cloud computing comprising many organizations’ portfolios, 38% of IT professionals admit they lack sufficient data about devices on their networks – a fact that’s more pronounced among shadow IT (45%).

Apart from personal devices, 40% of edge devices like IoT sensors, cameras and other remote equipment are unmanaged. Ivanti’s research found that 90% of ransomware attacks start with an unmanaged device.

Field CISO and Network Security Group SVP Mike Riemer highlighted the benefits of staying on top of upgrades and implementing least privilege access to limit potential damages from cyberattacks.

Ivanti’s report also explored zero trust principles in cybersecurity, noting threats can come from both inside and outside of an organization. Four fifths (79%) of IT professionals agree that stronger access controls are vital, but at the moment only around one in three use zero-trust network access (34%) and privileged access management (30%).

Although VPN usage (62%) and MFA (58%) adoption are reasonably widespread, it’s clear that further work could be done to ensure maximum protection against threats.

“IT and security leaders should focus on taking inventory of all IT assets and bringing them under management,” Ivanti Chief Security Officer Daniel Spicer concluded.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

You might also like

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.