- Byod is here, whether companies like it or not
- IT -Teams lack visibility across all corporate and worker units
- Zero principles of trust limits the damage potential but still there are few companies that are yet
With ransomware and other cyberattacks that dominate headlines globally, new Ivanti Research Byod policies really does not claim.
In the assessment of the state of Byod, Ivanti found that 44% use personal phones for work and 32% use their own personal computers. Three out of four IT workers agree that Byod is common, whether their organization allows or not.
Only half (52%) of organizations officially allow it, and where Byod is banned, four out of five (78%) workers still make it, adding the cyber risks that companies are already struggling with.
Byod is weakening your cyber security position
With an amalgamation of Byod, Edge and Cloud Computing, which consists of many organizations’ portfolios, 38% of IT professionals admit that they lack sufficient data on devices on their networks – a fact that is more pronounced among shadows it (45%).
Apart from personal devices, 40% of edge units such as IoT sensors, cameras and other remote equipment are not administered. Ivanti’s research found that 90% of ransomware -attacks start with a non -administered device.
Field Ciso and Network Security Group SVP Mike Riemer highlighted the benefits of staying on top of upgrades and implementing the least privilege access to limit potential damage from cyberattacks.
Ivanti’s report also explored zero principles of trust in cyber security and noted that threats can come from both inside and outside an organization. Four-fifths (79%) of IT professionals agree that stronger access control is important, but currently only one in three zero-drust is using network access (34%) and privileged access management (30%).
Although VPN use (62%) and MFA (58%) adoption is reasonably widespread, it is clear that additional work can be done to ensure maximum protection against threats.
“That and security leaders should focus on taking stock of all IT assets and bringing them under management,” concluded Ivanti Chief Security Officer Daniel Spicer.
Follow Techradar on Google News and Add us as a preferred source To get our expert news, reviews and meaning in your feeds. Be sure to click the Follow button!
And of course you can too Follow Techradar at Tiktok For news, reviews, unboxings in video form and get regular updates from us at WhatsApp also.



