Centrify finds Apple BYODs are liabilities

Centrify Corporation, the leader in securing identities from cyberthreats, today announced findings from a recent survey it commissioned to determine penetration and security compliance of Apple devices in the workplace. Conducted by Dimensional Research, the Centrify Apple survey demonstrates that while people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities.

Of the total 2,249 US workers surveyed, nearly half (45 per cent) use at least one Apple device for work purposes. In addition:

  • A majority of those Apple devices (63 per cent) are owned by the user as opposed to the company and are used to access work email, corporate documents and business applications
  • 59 percent of Macs are used to access confidential company information
  • 65 per cent of Macs are used to access sensitive or regulated customer information
  • 51 per cent of iPhones in the workplace are used to gain access to business applications
  • 58 per cent of iPads in the workplace are used to gain access to business applications

However, despite the popularity of Apple devices in the workplace, businesses do not invest enough resources to secure or manage them.

  • Over half (51 per cent) of all devices are secured by a password that is merely a single word or a series of numbers
  • Most devices (58 per cent) also do not have software installed to enforce strong passwords
  • More than half (56 per cent) of users report sharing their passwords with others
  • Only 17 per cent of Apple devices have a company-supplied password manager
  • Only 28 per cent of Apple devices have company-provided device management solutions installed
  • Only 35 per cent of Apple devices have encryption of stored data enforced by their company

Ultimately there is no discernable correlation between password strength and sensitivity of information accessed or accessible from a particular device or user

[quote_box_center]

“Centrify’s Apple survey spotlights the massive exposures that occur when devices do not comply with standard corporate security policies,” said Bill Mann, senior vice president of products and marketing, Centrify. “In particular, customer data represents a huge liability. Disclosure of regulated information such as healthcare records could expose corporations to fines and other legal action. Most importantly, there are solutions on the market today that can handily secure Apple devices without sacrificing user productivity. It’s time for IT to take action.”

[/quote_box_center]

Centrify provides the only fully integrated enterprise solution for Apple users, devices and applications across existing corporate networks and beyond. Whether Apple device users work inside or outside of the corporate firewall, Centrify provides all of the capabilities necessary to keep them secure and productive.

Centrify integrates comprehensive mobile & Mac management with Identity and Access management. Unlike standalone Enterprise Mobile Management vendors, who can only do device management and push applications to devices, Centrify integrates the ability to secure and manage devices with the identity policy required to manage app access, across devices. The ability to combine the device’s security posture and location with a user’s role to make application access decisions is unique to Centrify.

For more information about Centrify’s modern approach to Apple identity management, device management and application management, please visit www.centrify.com/apple.

+ posts

CIF Presents TWF – Ems Lord

Newsletter

Related articles

Building a people-centric strategy to unlock AI’s potential

Today, there is a real atmosphere of excitement for...

Beyond Borders: Cloud Solutions for Universal Interoperability

In the journey towards transforming ways of working, businesses...

The Future of Marketing: Automation vs Innovation

Does AI Understand Your Brand Voice? AI is dropping jaws...

AI Act – New Rules, Same Task

The first law for AI was approved this month...

Time to Ditch Traditional Tools for Cloud Security

Reliance on cloud technologies has significantly expanded the attack...

Subscribe to our Newsletter