Generation Y Poses Mobile Security Threat to BYOD Policies

Generation Y is bringing mobile security threats with them as they enter the workforce. According to a recent Fortinet survey, this tech-savvy generation is more willing to break the rules and put your corporate data at risk.

Fortinet surveyed 3,200 college graduates with full-time jobs between the ages of 21 and 32 in 20 countries. The respondents all owned a smartphone, tablet and/or laptop.

The research found that 51 percent of those surveyed would bypass company policies that restrict the use of personal devices, cloud storage or emerging wearable technology for work. It also showed a 42 percent increase in the willingness to break usage rules compared to a similar survey conducted last year.

Of the 89 percent of respondents that stated they had a personal cloud storage account, 70 percent admitted to using their account for work-related items such as passwords, financial information, confidential business documents and customer data:

  • 12 percent – work passwords
  • 16 percent – financial information
  • 22 percent – confidential business documents (contracts and plans)
  • 33 percent – customer data

Thirty six percent of respondents using their personal cloud for work purposes said they would break any rules enacted to stop them.

While the study’s results make the future of mobile management appear dismal, there is a silver lining. The vast majority – 88 percent – of the respondents accept that they have an obligation to understand the security risks posed by using their own devices. Education and advancements in technology services could be the solution to the BYOD security threat Fortinet has brought to the forefront.

IT administrators must proactively educate employees, particularly Gen Y, about mobile security threats and the risks associated with their actions. Also, consider distributing basic security best practices such as only using a secure Wi-Fi connection or keeping software up-to-date to protect their devices and the company’s data.

In addition, new tools and services cannot simply be ignored or banned. If employees are embracing unsanctioned technologies, it’s generally to fill a void that existing devices and services aren’t addressing. Listen to users to better understand the business value of these tools. Then find a solution that fills the employee’s need, while keeping sensitive corporate data protected.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

e-Cycle BYOD Mobile Data Security Tips #5 – Secure Data in the Cloud, Not the Device

As a global leader in the mobile buyback and recycling industry, e-Cycle is pleased to share the fifth video in our series of BYOD mobile data security risks and recommendations for organizations thinking of implementing a Bring Your Own Device (BYOD) program. These tips will help enterprises successfully secure sensitive corporate data when employees use their personal mobile devices for work.

e-Cycle BYOD Mobile Data Security Tips – #5 Secure Data in the Cloud, Not the Device from e-Cycle LLC. on Vimeo.

—————————————————————————————————
e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

 

Businesses Request a Quote Button

 

 

e-Cycle BYOD Mobile Data Security Tip #2 – Take Caution When Downloading Mobile Apps

As a thought leader in our industry, e-Cycle is sharing our second video in a series of mobile data security risks and recommendations on how businesses can secure their sensitive corporate mobile data when implementing a BYOD program at their organization. Additional BYOD data security solution videos will be available soon.

e-Cycle provides secure, profitable and responsible solutions for reusing and recycling used mobile phones and tablets. e-Cycle collects used mobile devices from businesses, reimbursing them for mobile devices that retain value and recycling all other wireless devices at no charge. The information on every phone is either deleted or destroyed using the industry’s most rigorous data security measures. In January 2012, e-Cycle became the only mobile buyback and recycling company in the world to become e-Stewards certified.

Visit www.e-Cycle.com to learn how you can sell and recycle your used mobile phones and tablets and protect your private data.

Businesses Request a Quote Button

 

e-Cycle BYOD Mobile Data Security Tip #1 – Password Protection for Devices

As a thought leader in our industry, e-Cycle is sharing a series of recommendations on how businesses can secure their sensitive corporate mobile data when implementing a BYOD program at their organization. Look for additional BYOD data security solution videos coming soon.

e-Cycle provides secure, profitable and responsible solutions for reusing and recycling used mobile phones and devices. e-Cycle collects used mobile devices from businesses, reimbursing them for mobile devices that retain value and recycling all other wireless devices at no charge. The information on every phone is either deleted or destroyed using the industry’s most rigorous data security measures. In January 2012, e-Cycle became the only mobile buyback and recycling company in the world to become e-Stewards certified.

To securely sell your used mobile phones and tablets, visit www.e-Cycle.com.

Businesses Request a Quote Button