How Safe is Your Data?
Today, more than ever before organizations spend millions of dollars to keep their networks and data safe. Corporations invest in monitoring tools and endpoint protection system to prevent breaches inside their networks. However, not all corporate data is safe once it leaves the protection of their firewalls. Once the data leaves your building it is exposed to seen and unseen threats. In the modern-day work environment more employees work from remote locations and at home. Mobile devices used in the corporation today carry sensitive corporate data and are a prime target for theft and data breaches.
What Are The Risks Associated With Corporate Data Once It Leaves Your Office?
1. Corporations rely on the mobile workforce
Today, the mobile workforce makes up 75 percent of the company's employees. The average employee uses more than three devices at a time to connect to company’s networks. More than 70 percent of employees’ personal mobile devices access corporate data.
2. Corporate employees access sensitive data on the go
Today, more than 70 percent of corporate employees don’t work in an office anymore. Most employees work from multiple locations and only telecommute once a week. Your mobile employees need to access data just like your office employees. Therefore, 81 percent of the corporation’s employees access their data on the go.
3. Employees use unauthorized free file sharing service to share work related documents
Most companies think that hackers are the number one cause of data breaches. Although, hackers count for a major percentage of corporate data breaches, but 36 percent of data breaches come from employees’ misuse. Seventy-seven percent of companies have strict data policies prohibiting employees from using on-line sharing services. Reports indicate that 72 percent of corporate employees use on-line sharing services. Only 32 percent of the corporations surveyed took steps to ensure their employees didn’t mishandle corporate information.
4. Corporate or BYOD laptops are stolen containing critical data
Laptops and mobile devices put corporate data at risk. Reports indicate that one laptop is stolen every 53 seconds and one out of 10 laptops is lost or stolen. More than 70 percent of corporate laptops are not encrypted nor have a means to remotely wipe the hard drive if lost or stolen. Considering the amount of data stored on the company’s laptops, more than half of the stolen laptops count for corporate data breaches.
5. In the next three years laptop and Smartphone usage will triple for corporations
Smartphone and tablet theft is worse for a corporation than laptop theft. Studies show that 90 percent of employees working in the U.S. use their own Smartphone at work. Also, 43 percent of corporate executives now use company or personal tablets for their job. In the next three years the use of tablets for corporations will triple and increase the endpoints that will be breached for companies.
6. Cell phone theft has increased since 2007
In America 1.3 billion Smartphones are stolen each year. Since 2007 cell phone theft has increased 40 percent, which means that ever 3.5 seconds a cell phone is stolen. What worries corporations are that 65 percent of the phones stolen can’t be remotely wiped. Another 43 percent of the phone wasn’t password protected. More than 76 percent of companies don’t encrypt their Smartphones. This could be the last measure to protect corporate data.
7. Businesses need to understand how much regulated data they store on mobile devices
IT department has a hard time governing corporate data stored on mobile devices. Most IT department doesn’t know how much regulated data are stored on employees’ endpoint devices. It is estimated that 81 percent of corporations have no idea how much regulated data their employees store on their mobile devices. Also, only 16 percent of corporations know how much regulated data is stored in their cloud-based file-sharing apps.
8. CIOs is unsure their mobile security policies would satisfy an auditor
If an audit was to take place in your business most companies would fail. Seventy-two percent of all corporate IT pros can’t detect if employees are using secure or insecure endpoint devices. Furthermore, only 28 percent of corporate CIOs think that their security policies would pass an auditor. Another 40 percent of IT pros have no idea if company employees follow their organization’s policies when accessing and using regulated data on their endpoint devices. However, 51 percent of corporations are confident that they preserve their data on mobile devices and can pass investigative requirements, litigation, or regulator controls.