sb-au logo
Story image

BYOD: With greater device choice comes greater responsibility, Australian survey finds

14 Nov 2016

Gone are the days of being locked into using a specific device or operating system in a workplace, as now 60% of Australian organisations now allow employees to choose between a Mac and a PC.

Latest findings from Jamf's 'Choose Your Own Devices' survey, which surveyed 122 Australian IT managers, suggest that flexibility is becoming an increasingly important part of the workplace, with 83% of organisations allowing employees to work remotely.

This has led to an increased use of cloud-based applications, in fact 30% of Australian organisations now allow employees to use them.

However, with flexibility comes the uncertain world of device security - a difficult task when dealing with BYOD, CYOD and a range of devices and operating systems.

The survey found that 23% of organisations support no more than 75% of their entire device fleet with password policies and antivirus, though this is expected to improve within the next year.

The survey found that one in four IT managers find application compatibility difficult - 21% combat initial purchase costs and 80% worried about device support. In addition, 33% of respondents believed user training was an issue and 34% were concerned about security standards.

“The heart of IT is about empowering people and being able to serve and secure all types of users, on all the devices they use, wherever they are across mobile, cloud, and personal computing environments.  The survey would suggest that what’s needed is an integrated approach to manage, secure, and support users and a user’s device," comments Jamie Davidson, Jamf's country manager for ANZ.

Davidson says the next year will have a specific focus on the speed of change within their IT environments.

“By helping unify and automate the delivery of the assets and services users need, IT managers will be able to help their end users more effectively, make IT more strategic, and ensure the business can be even more productive,” he says.

Other findings from the survey noted that 62% of respondents believe device configuration and reconfiguration is a resource-intensive process, 48% believe software patching is also resource-intensive, 42% are regularly dealing with OS updates and 38% with lost, stolen or broken devices.

With these hassles, 52% of IT managers believe 'firefighting' takes time out of proactive approaches. 34% believe budget constraints are a hassle, 31% believe dealing with current and poor IT solutions is a barrier and 16% believe security isn't being taken seriously enough by management.

Davidson says that while technologies shift to better fit for mobile, productivity and engagement, IT needs to shift to a user-centred approach too.

"As a result, IT managers could well be advised to focus on enabling staff to use a new device ‘out of the box’ by deploying solutions and strategies which enable users to have access to a properly configured and secured device that can be immediately used in the workplace," Davidson says.

“The days of staff having to wait for their device to be manually configured and checked by the IT department are over.  In addition, what with governance and compliance weighing on corporate agendas today, IT strategies should also look at what applications should be cloud-based applications as opposed to what systems and processes remain on premise,” Davidson concludes.

Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.More
Link image
How to better protect your organisation's most valuable asset - its data.
Data resilience strategies are becoming increasingly critical in relation to the skyrocketing value of data and the proliferation of malicious entities wishing to steal it.More
Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More