- Byod is there, whether or not companies like
- IT teams lack visibility in all business and workers devices
- The principles of zero trust limit the potential for damage, but few companies are still there
With ransomware and other cyberattacks dominating major titles in the world, new research policies Ivanti Recommens byod really do not help.
Evaluating the state of Byod, Ivanti found that 44% use personal phones for work and 32% use their own personal computers. Three out of four IT workers have agreed that Byod is common, whether their organization allows it or not.
Only half (52%) of organizations officially authorize him, and where Byod is prohibited, four workers out of five (78%) still do it, adding to the cyber-risk with which companies are already fighting.
Byod weakens your cybersecurity posture
With a merger of Byod, Edge and Cloud Computing including many organizations of organizations, 38% of IT professionals admit that they lack sufficient data on devices on their networks – a more pronounced fact among the shadow IT (45%).
In addition to personal devices, 40% of EDGE devices such as IoT sensors, cameras and other remote equipment are not managed. Ivanti’s research has revealed that 90% of ransomware attacks start with an unmanaged device.
The vice-president vice-vice-vice of CISO and security of the Mike Riemer network networks highlighted the advantages of remaining above upgrades and to implement the less privileged access to limit the potential damage of cyber attacks.
The Ivanti report also explored the principles of zero confidence in cybersecurity, noting that threats can come inside and outside an organization. Four-fifths (79%) of IT professionals are suitable that stronger access controls are essential, but only approximately one in three use access to the zero-frust network (34%) and privileged access management (30%).
Although the use of VPN (62%) and the adoption of the MFA (58%) are reasonably widespread, it is clear that additional work could be carried out to ensure maximum protection against threats.
“IT and security leaders should focus on the intention of all IT assets and put them in management,” concluded the director of security Ivanti, Daniel Spicer.
Follow Techradar on Google News And Add us as a favorite source To get our news, criticisms and expert opinions in your flows. Be sure to click on the follow!
And of course, you can also Follow Techradar on Tiktok For news, criticism, unpacking in video form and obtain regular updates to us on Whatsapp Also.