Share

Related Links

Related Stories

  • IBM: Top threats include data breaches, BYOD, browser exploits
    When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for Internet Explorer and Java, along with renewed concerns around social media password security and continued disparity in mobile devices and corporate bring-your-own-device (BYOD) programs.
  • CSA puts MDM and BYOD in focus with 17 key security areas
    While most enterprises have some form of mobile policy in place, they are likely missing an understanding of the full technology, process and people implications of mobile device management (MDM). To help remedy the issue, the Cloud Security Alliance (CSA) is tackling the bring-your-own device (BYOD) trend and full lifecycle security management for mobile devices with a new research report, Mobile Device Management: Key Components, V1.0.
  • Mobile security focus is on the rise, but still needs work
    Mobile security efforts are on the rise in the wake of the bring-your-own-device (BYOD) trend, according to new research from security vendor nCircle.
  • Security issues increase corporate BYOD costs
    Despite the perception that bring your own device (BYOD) saves organizations money, more than two-thirds of IT professionals believe it increases costs, primarily due to the added security risks and measures required, according to a survey by Lieberman Software.
  • Gen Y on BYOD: Don't tell me what to do
    More than one-third of Gen Y employees admitted they have or would contravene a corporate policy banning the use of personally owned devices for work purposes, according to a survey sponsored by Fortinet.

Top 5 Stories

News

BYOD is driving privacy concerns among enterprise workers

03 October 2012

Workers are developing privacy fears that employers are keeping tabs on them through bring your own device (BYOD) management software, according to new research from Fiberlink.

Out of a survey of 2,243 enterprise workers, most displayed concerns that BYOD would “transform IT from helpful business partner into an Orwellian Big Brother keeping round-the-clock tabs on all device activity”, Fiberlink said in its blog.

Tracking software and mobile device management clients are centerpieces of security strategies around BYOD, but a full 82% of workers said that they see the ability to be tracked as an invasion of their privacy, and three-quarters said that as a result, they would not let an employer install tracking software on their device in exchange for access to corporate resources. Also, 82% said that employers tracking the websites that they browse is either 'of concern' or 'extreme concern' to them. Overall, only 15% said that they aren’t concerned at all about tracking software.

Meanwhile, 86% are concerned to very concerned that employers could delete personal pictures, email profiles and music--whether founded fears or not, it's another example of the Big Brother fears that BYOD security and tracking software seems to engender.

“We took it upon ourselves to do a bit of detective work on the topic to test our hypothesis on the privacy breaching backlash of BYOD,” said researchers. “Lo and behold, the survey results were on par with expectations—the overwhelming majority concerned about moderation of on-device activity and the privacy of data contained thereon.”

The global BYOD and enterprise mobility market is expected to grow from $67.21 billion in 2011 to $181.39 billion by 2017, according to Markets & Markets, at an estimated CAGR of 15.17% from 2012 to 2017.

North America commanded the largest share, with 36.10% of the overall managed market in 2011 at $24.26 billion; and is expected to reach $58.60 billion by 2017, at a CAGR of 12.9% from 2012 to 2017.

This article is featured in:
Industry News  •  Wireless and Mobile Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×