- Byod is now widespread, with security teams struggling to control, reporting allegations
- EDGE -Units remain exposed as research shows that 40% are not -leaded across companies
- Adoption of zero trust hangs as employees continue to use personal devices in spite of business policies
Bring your own device (Byod) are becoming the rule rather than the exception in workplaces, new research from Ivanti has claimed.
The company found that personal phones, laptops and hotspots are increasingly used for work tasks, often out of control of IT departments.
The survey found that almost half (44%) of workers had used their personal phone to work, while 37% had used it as a hotspot and 32% had used their own computer.
Byod regardless of politics
Three out of four IT workers said bring your own device a regular event, despite the fact that only 52% of organizations officially allow it.
Where policies prohibit it, 78% of employees do so regardless.
This lack of supervision has left companies potentially vulnerable. Microsoft Data shows that more than 90% of events with ransomware begin with a non -managed device.
Ivanti’s research agrees with this, with 38% of IT professionals who admit that they do not have adequate data on devices on their network.
Edge devices, from smart cameras to remote sensors, add additional exposure.
According to the report, about 40% of such devices do not remain -controlled.
“To secure company networks against Edge Device -organizations, organizations must keep Edge units upgraded to the latest release and push security validation to the user’s endpoint,” said Mike Riemer, SVP, Network Security Group and Field CISO at Ivanti.
The Zero Trust models also fall behind the adoption expectations.
79% of the professionals say access controls are more important when the staff works externally, but only 34% of companies use Zero Trust Network Access and only 30% use privileged access management.
Daniel Spicer, CSO in Ivanti, said: “IT and security leaders should focus on taking stock of all the assets and bringing them under administration. This means you can discover all existing units, enforce a clear Byod policy and make sure that the Byod policy includes the ability to manage a unit that was not purchased by the company itself.”
The report concludes that traditional perimeters are no longer effective and that companies have to expand control to all devices wherever they are and make use of identity -based access controls.
Follow Techradar on Google News and Add us as a preferred source To get our expert news, reviews and meaning in your feeds. Be sure to click the Follow button!
And of course you can too Follow Techradar at Tiktok For news, reviews, unboxings in video form and get regular updates from us at WhatsApp also.



