Businesses at Risk from Employee Use of Mobile Devices to Access Company Networks

Feb. 28, 2012
Many employees now use mobile devices to access their company's network. But, what happens if those devices are lost, stolen or resold to others outside the company? Could sensitive data be compromised? The risks may be greater than you think. Earlier ...

Many employees now use mobile devices to access their company's network. But, what happens if those devices are lost, stolen or resold to others outside the company? Could sensitive data be compromised?

The risks may be greater than you think.

Earlier this month, Motorola announced that approximately 100 out of a batch of 6,200 Xoom tablets that were refurbished by Motorola Mobility may not have been completely cleared of the original owner's data prior to resale. An earlier analysis found that more than half of 50 mobile phones purchased from second-hand resellers on eBay contained personal data left over from their original owners.

New research from Mobilisafe, a Seattle-based mobile security company, reveals just how widespread employee mobile device use is and how little oversight IT departments are exercising particularly at resource-constrained small and midsized businesses (SMBs).

For the study, employees at SMBs agreed to help evaluate a product that provides visibility to all mobile devices accessing their company's network. Then, over the course of three months, Mobilisafe mapped more than 38 million employee mobile device connections, providing key data for its analysis. The interim results from the beta trial showed that:


On average, more than 80 percent of the employees are already using smartphones and tablets.


A new device model was introduced to a company for every 6.6 employees.


56 percent of iOS devices were running out-of-date firmware.


39 percent of total authenticated devices were inactive for more than 30 days, prompting concerns and conversations with employees about lost, sold or otherwise misplaced devices with employee credentials and sensitive corporate data.


Clearly, this is an area where businesses of all sizes need to direct more focus. No one expects the "bring your own device" (BYOD) trend to slow down any time soon, so companies need to fully recognize the risks involved and address them accordingly.

Popular Sponsored Recommendations

Process Mining For Dummies

Nov. 19, 2023
Here it is. Everything you need to know about process mining in a single book, written in the easy-to-understand, hard-to-forget style that ‘For Dummies’ manages so effortlessly...

Food and Beverage 2024 Trends and Outlook for North America

Oct. 29, 2023
Ready to hear what 200 of your peers said are the top challenges and opportunities in 2024? Don’t fall behind. Uncover actionable insights to better prepare for 2024 in this whitepaper...

Powering Up Productivity: The Transformative Power of AP Automation in Manufacturing

Oct. 25, 2023
Discover how AP Automation is revolutionizing the manufacturing industry, driving efficiency, cost savings, and security. In today's world, automation is the key to staying competitive...

Are You Positioned To Tackle Supply Chain Risk?

Sept. 20, 2023
Supply chain disruption is here to stay, but you can keep ahead of potential issues — and identify new opportunities — by regularly assessing your suppliers. Download our supplier...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!