The more things are connected to the Internet, the more opportunity there is for these things to get hacked, cautioned Bob O'Donnell, founder and chief analyst of Technalysis Research.
Internet of Things devices are actively penetrating highly regulated industries, such as healthcare, energy, financial services, and retail, and infrastructure supporting those devices are vulnerable to well-known and patchable security flaws, according to a recent report from OpenDNS.
To help firms cope with BYOD security risks, Prateek Panda, co-founder and chief marketing officer of mobile security firm Appknox, recommends that CIOs take the following five steps to improve BYOD security at their firms.
Employees are using their personal mobile devices to "work around" restrictions that prevent the use of corporate laptops to watch streaming video of the NCAA basketball tournament games. This can open up the company to security threats and can impact network performance, according to a survey of more than 350 IT pros by IT staffing firm TEKsystems.
Many start-ups trying to pinch pennies as they struggle to finance their projects see BYOD as a way to save money on equipment while getting the most out of their overworked employees. But is BYOD worth the security risks for start-ups? It depends.
While the FTC's security and privacy recommendations for IoT devices and data are useful, they are voluntary and therefore lack teeth. Companies have little incentive to spend the extra time and money needed to implement them.
A robust 95 percent of enterprises now allow the use of employee-owned devices, and close to two-thirds of employees say that having access to work email and other business apps at all times increases their productivity, according to stats compiled by security firm Symantec in an infographic.
Although 4G LTE networks promise much faster mobile broadband speeds, they could also open up enterprises to increased security risks, warns Martin Nuss, chief technology officer at Vitesse Semiconductor.
Blocking or ignoring BYOD can cause employees to take matters into their own hands, resulting in shadow IT that can pose security risks for the enterprise.
Companies are failing to address third-party security risks, despite some recent high-profile breaches that resulted from poor security at third-party vendors, such as the Target breach that exposed 40 million credit and debit card numbers and other information.