Almost 70% of European and US employees would stop using their own device for work purposes if they knew their employer could remotely wipe or lock it, a survey has revealed.
The AdaptiveMobile study of 1,000 IT decision makers and 1,000 employees, conducted by Harris Interactive, found that 83% of staff would stop using their own device, or still use it with deep concern, if they knew their employer could see what they were doing at all times.
With 61% of enterprises already having this level of access in place – and with a need to increase control to address growing security threats – organisations could face a backlash in their employees’ willingness to adopt BYOD.
“Over 75% of enterprises surveyed were unable to meet eight out of ten of their current top security requirements,” said Gareth Maclachlan, CCO at AdaptiveMobile. “When this is combined with the fact that only 11% of employees are aware of the current level of enterprise control over their device, it is imperative that other ways of delivering mobile protection are considered.
“Without a new approach to mobile security, employers risk losing the savings they would accrue with BYOD remaining responsible for providing the devices and connectivity to all employees.”
There was also a clear disconnect between employee awareness of employer policies in the study. 91% said they have policies in place to protect against mobile security breaches, but almost half (48%) of those already using their own device were unaware these policies exist.
This growing chasm between employer and employee has created the opportunity for a new approach to enterprise security – with over 75% of employees endorsing their operator as being able to bridge the gap and protect both parties. Employers apparently agree, with 72% stating they would buy a mobile security management service from their operator, and 65% saying they would switch operators to get an effective solution.
“To prevent employees rejecting BYOD and maintaining control over their personal device and usage, a solution is needed that maintains user privacy, whilst also keeping the enterprise free from exposure,” said Maclachlan.
“A hosted security service, delivered via operators, would give employees peace-of-mind that their own usage is protected, whilst still giving enterprise administrators complete control over corporate access, usage and integrity.”