SlideShare a Scribd company logo
1 of 7
BUSINESS.
DO YOU PRACTICE
SAFE BYOD?
MOBILE DATA IS
RISKY
BYOD SECURITY IS A PROBLEM.
Only 21% perform remote
device wipe when employees
leave the company.
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
21%
SURVIVAL TIP 1
CREATE A MOBILE DEVICE
SECURITY POLICY
31%
Only 31% of BUSINESSES
are mandating device
passwords and key locks
on personally-owned
devices in the workplace.
BYOD POLICY RULES
ARE BEING BROKEN.
SURVIVAL TIP 2
STOP MAKING EXCEPTIONS
TO YOUR POLICY
EMPLOYEES DON’T UNDERSTAND
BYOD PRIVACY RISKS
OF BUSINESSES HAVE NOT TRAINED EMPLOYEES
TO UNDERSTAND BYOD PRIVACY RISKS.
2% UNSURE
21% YES
77% NO
SURVIVAL TIP 3
MAKE SAFE BYOD EVERYONE’S RESPONSIBILITY
75% will support Macs
in the next two years.
APPLE IS
HERE TO STAY.
• • • • • • • • • • • • • • • • • • • • • • •
100%
90%
80%
70%
60%
50%
40%
30%
30%
20%
10%
0%
65% of businesses
will support Macs in
the next 10 months.
MONTH
10
YEAR
2
APPLE
SURVIVAL TIP 4
PREPARE FOR THE COMING OF APPLE
BUSINESSES DON’T HAVE
POLICIES TO PROTECT
CORPORATE FILES IN PUBLIC
CLOUDS.
NO, BUT WE ARE PLANNINGTO
WRITE AN ACCEPTABLE USE POLICY
YES NO DON’T
KNOW
SURVIVAL TIP 5
DON’T UNDERESTIMATE THE DANGERS
OF PUBLIC CLOUDS
@Acronis
300 TradeCenter, Suite 6700 | Woburn, MA 01801 | USA
+1 781 782-9000 | info@acronis.com | www.acronis.com
Independently conducted by Ponemon Institute
© 2013 Acronis International GmbH. All rights reserved.
ARE YOU READY FOR BYOD ?DOWNLOAD THE E-BOOK:
THE BYOD SURVIVAL GUIDE

More Related Content

Similar to Byod tips acronis2013

IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITSolarWinds
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the LawJISC Legal
 
Managed mobility - SSDesign
Managed mobility  - SSDesignManaged mobility  - SSDesign
Managed mobility - SSDesignSS Design
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Symantec
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereForescout Technologies Inc
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At WorkBlueboxer2014
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
Designing Frictionless Experiences - IxDA Grand Rapids
Designing Frictionless Experiences - IxDA Grand RapidsDesigning Frictionless Experiences - IxDA Grand Rapids
Designing Frictionless Experiences - IxDA Grand RapidsJoe Johnston
 
Reader2011 hr2
Reader2011 hr2Reader2011 hr2
Reader2011 hr2Hugues Rey
 

Similar to Byod tips acronis2013 (20)

IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of IT
 
Upwardly mobile
Upwardly mobileUpwardly mobile
Upwardly mobile
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
CyberTechEurope.pptx
CyberTechEurope.pptxCyberTechEurope.pptx
CyberTechEurope.pptx
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Progressive Times - May 2012
Progressive Times - May 2012Progressive Times - May 2012
Progressive Times - May 2012
 
Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the Law
 
Managed mobility - SSDesign
Managed mobility  - SSDesignManaged mobility  - SSDesign
Managed mobility - SSDesign
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
BYOD Security Risks for Business
BYOD Security Risks for BusinessBYOD Security Risks for Business
BYOD Security Risks for Business
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
Shailesh final
Shailesh finalShailesh final
Shailesh final
 
Designing Frictionless Experiences - IxDA Grand Rapids
Designing Frictionless Experiences - IxDA Grand RapidsDesigning Frictionless Experiences - IxDA Grand Rapids
Designing Frictionless Experiences - IxDA Grand Rapids
 
Reader2011 hr2
Reader2011 hr2Reader2011 hr2
Reader2011 hr2
 
The Cisco connected world report
The Cisco connected world reportThe Cisco connected world report
The Cisco connected world report
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Byod tips acronis2013

  • 1. BUSINESS. DO YOU PRACTICE SAFE BYOD? MOBILE DATA IS RISKY
  • 2. BYOD SECURITY IS A PROBLEM. Only 21% perform remote device wipe when employees leave the company. 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 21% SURVIVAL TIP 1 CREATE A MOBILE DEVICE SECURITY POLICY 31% Only 31% of BUSINESSES are mandating device passwords and key locks on personally-owned devices in the workplace.
  • 3. BYOD POLICY RULES ARE BEING BROKEN. SURVIVAL TIP 2 STOP MAKING EXCEPTIONS TO YOUR POLICY
  • 4. EMPLOYEES DON’T UNDERSTAND BYOD PRIVACY RISKS OF BUSINESSES HAVE NOT TRAINED EMPLOYEES TO UNDERSTAND BYOD PRIVACY RISKS. 2% UNSURE 21% YES 77% NO SURVIVAL TIP 3 MAKE SAFE BYOD EVERYONE’S RESPONSIBILITY
  • 5. 75% will support Macs in the next two years. APPLE IS HERE TO STAY. • • • • • • • • • • • • • • • • • • • • • • • 100% 90% 80% 70% 60% 50% 40% 30% 30% 20% 10% 0% 65% of businesses will support Macs in the next 10 months. MONTH 10 YEAR 2 APPLE SURVIVAL TIP 4 PREPARE FOR THE COMING OF APPLE
  • 6. BUSINESSES DON’T HAVE POLICIES TO PROTECT CORPORATE FILES IN PUBLIC CLOUDS. NO, BUT WE ARE PLANNINGTO WRITE AN ACCEPTABLE USE POLICY YES NO DON’T KNOW SURVIVAL TIP 5 DON’T UNDERESTIMATE THE DANGERS OF PUBLIC CLOUDS
  • 7. @Acronis 300 TradeCenter, Suite 6700 | Woburn, MA 01801 | USA +1 781 782-9000 | info@acronis.com | www.acronis.com Independently conducted by Ponemon Institute © 2013 Acronis International GmbH. All rights reserved. ARE YOU READY FOR BYOD ?DOWNLOAD THE E-BOOK: THE BYOD SURVIVAL GUIDE