The risks and challenges of using personal devices for work

Share post:

According to a new SlashNext report, the rising practice of using personal devices for business reasons poses a significant danger to enterprise security.

Allowing workers to use their own devices for work may increase productivity and save the firm money, but it may also result in a lack of separation between personal and work-related duties, which can lead to security concerns. The survey had 300 participants, who were security professionals and workers from firms with more than 1,000 employees across North America.

The survey revealed that the use of personal devices for work is increasing owing to the convenience and familiarity they give. The usage of personal computers or mobile devices has become vital as more individuals embrace remote work or a hybrid work approach. The top three work-related actions performed on personal devices, according to the SlashNext survey, include using personal texting apps for work (66%), using personal and private messaging apps for work (59%), and occasionally using business email for personal purposes (57%).

Yet, the survey found that utilizing personal devices for work poses security risks. For example, 71% of study respondents stated they keep crucial business passwords on their personal phone, putting them at risk of compromise. Moreover, 43% of employees have been targeted by work-related phishing attempts. This danger is heightened by the usage of personal chat applications for work, which is cited as an increasing worry by 95% of security experts questioned.

While security training is often touted as a way to prevent attacks, 98% of security professionals surveyed said that employees are still vulnerable to phishing attacks and other threats even with regular training.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

North Korean Job Scam Targeting IT Job Seekers

North Korea’s Lazarus advanced persistent threat (APT) group has launched a sophisticated campaign, “Operation 99,” targeting freelance software...

Hackers Exploit FastHTTP in High-Speed Microsoft 365 Attacks

Threat actors are employing the FastHTTP Go library to launch high-speed brute-force password attacks on Microsoft 365 accounts...

YouTubers Targeted As Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results

Attackers have found a new way to infect people seeking pirated or cracked software: planting malicious download links...

New macOS Malware Exploits Apple’s Security Features to Stay Hidden and Steal User Data

A newly discovered variant of the Banshee macOS Stealer malware is putting 100 million Apple users at risk...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways