Home  //  Tags

New report: employee work habits risk data breaches Home Subscribe Email Print

How the changing work environment is creating new data security challenges

The much anticipated Internet Trend 2015 report has been released by Mary Meeker, General Partner at Kleiner Perkins Caufield & Byers. The reports gives a great window into what is coming in tech.

It reports that that while Internet user growth has slowed, the impact of how Internet is being used continues to change rapidly. Whilst many changes appear to reflect consumer interests  - eg: Social Media, Netflix – these changes also have a major impact on enterprises.
Regardless of who owns a device, the need for mobility and use of personal devices impacts enterprise data security. The report says 6 out of 10 of the most used apps in the world are messaging based; WhatsApp, WeChat, Facebook Messenger, Kakao, Viber and Snapchat. Do these apps put corporate data at risk? Are passwords being shared with corporate networks?

Most telling, the 2015 Internet Trends Report analyzes the smartphone behavior of millennials, with 87% of US millennials sayiing their smartphone never leaves their side, day or night. Millennials spend more than 2 hours each day on mobile devices and want to do “everything” on their devices. They are demanding to be able to work whenever and wherever they want, preferring collaborating online over in-person. Worryingly, the report suggests people download their own apps for work use, likely outside of IT's control or awareness.

In tandem, our partner Absolute Software also reported  that the line between corporate and personal device use has become extremely blurred. Corporate data is readily available on personal devices whilst personal apps and data are easily accessed from corporate-owned devices. 
When it comes to data security, an approach involving people, processes and technology goes far in addressing vulnerabilities created through mobility and employee behaviour. 

Curious about how you can address this?
Technology comes to the rescue of the end user and the end-point.
Deploy the most complete encryption -  enforce encryption on all laptops, tablets, phones, USB sticks. Seamlessly manage keys and recovery functions on BitLocker and FileVault 2 encrypted drives.
Test your employees with mock phishing - address the challenge that employees continue to click on emerging phishing threats as they hit their inbox, thereby risking loss of corporate data. 
Give your laptops the same MDM protection as your tablets and phones - gain comprehensive visibility into the devices usage, configuration, location and loss. Persistently control and secure all these endpoints from a single cloud-based console. 
Detect evasive APTs in real time  - utilize in-depth analysis and actionable intelligence to assess, remediate, and defend your organization against targeted attacks.


Contact Re-Soft today to get help!


To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up