Consumerism Opens Corporate Security Gap

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Previous Next

Click through for results from an IDC study, conducted on behalf of Unisys, regarding the consumerization of IT and subsequent security risks.

While there may have been a time when IT organizations could dictate which devices and applications end users could use, employees are increasingly spending their own money to not only buy devices, but also contract to use software-as-a-service applications. Of course, sometimes the definition of their own money is fluid. They may not be using the IT budget, but in many instances they are using budget dollars allocated to the business unit they work for.

A new study from International Data Corp., conducted on behalf of Unisys, finds that this creates a lot of potential risk in the form of corporate data on any number of unmanaged devices and applications that are beyond the reach of most data governance policies. Coming down hard on this practice is not an especially savvy political move for most IT leaders. And most of them don’t have the internal expertise to manage these devices.

Will the consumerization of IT be the final nail in the internal IT support desk, or is there some middle ground to be had between end users rebelling against the status quo and IT organizations that are ultimately responsible for the corporate data?
 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

UtimacoEVMTokenization0x What's Next After the EMV Migration? Tokenization

Security controls need to be put in place to protect cardholders' confidential information all the way through the transaction process. ...  More >>

ZixCorpDataLeaks0x Top Data Leak Vulnerabilities and How to Secure Them

All companies have sensitive data that is vulnerable to theft, and hackers will continue to explore new ways to profit off of valuable data. ...  More >>

SysAidIoTSecurity0x Beware the Hidden Dangers of the Internet of Things

It finally feels as though we're about to hit the point of no return with IoT. IT departments must now consider and address the security implications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date