Welcome!

@CloudExpo Authors: Yeshim Deniz, Karthick Viswanathan, Elizabeth White, Liz McMillan, Zakia Bouachraoui

News Feed Item

ISACA Survey Reveals Growing Acceptance of BYOD in Australia and New Zealand

Global not-for-profit IT association ISACA today released findings from its 2012 IT Risk/Reward Barometer survey. Respondents in Australia and New Zealand report a growing acceptance of “bring your own device” (BYOD) in the workplace, while also acknowledging that they believe the risk still outweighs the benefit.

The IT Risk/Reward Barometer surveyed more than 4,500 IT professionals worldwide about the risks and rewards associated with BYOD and cloud computing, among other topics. When it comes to BYOD, companies in Oceania and Africa tend to allow employees to use their own device for work purposes more than companies in other regions do. In fact, nearly half of responding enterprises in Oceania allow it (48%), while only 28% of European companies do.

Only 22% of respondents in Australia and New Zealand say the benefits—including increased productivity and efficiency and cost reduction—outweigh the risk, while 47% still believe that the risk is greater. Yet despite the dangers, 32% of enterprises still do not have a security policy in place for BYOD.

To help control BYOD risk, enterprises in Australia and New Zealand report having the following security controls in place:

  • Password management system (48%)
  • Remote wipe capability (40%)
  • Encryption (37%)

Nearly 70% of enterprises in Australia and New Zealand allow employees to access social networking sites from a work device, and 72% allow employees to shop online using a work-supplied device.

However, IT professionals report that the following employee activities pose a high risk to the enterprise:

  • Storing work passwords on a personal device (78%)
  • Losing a work-supplied computer or smart phone (67%)
  • Using an online file-sharing service for work documents (63%)
  • Downloading personal files onto a work-supplied device (51%)

“Enterprises in Oceania seem to understand and accept that employees are increasingly using their own devices for work and personal activities,” said Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, FACS CP, director of ISACA and director of information security at BRM Holdich. “However, controls need to be in place that include clearly communicated policies and ongoing education that trains employees to help protect both the enterprise and the employees.”

ISACA, a not-for-profit association serving 100,000 IT professionals in 180 countries, provides resources to help enterprises address this challenging issue.

“ISACA recently published Securing Mobile Devices With COBIT 5 to help enterprises address mobile device security, including BYOD,” said Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, international vice president of ISACA. “By applying the COBIT framework to mobile device security, enterprises can better plan, implement and maintain comprehensive security for these devices.”

Full survey results are at www.isaca.org/risk-reward-barometer. COBIT 5 is at www.isaca.org/cobit.

About the IT Risk/Reward Barometer

The annual IT Risk/Reward Barometer helps gauge attitudes and organizational behaviors related to the risk and reward associated with the blurring boundaries between personal and work devices (BYOD), cloud computing, and increased enterprise risk related to online employee behavior. It is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 173 members in Oceania.

About ISACA

With 100,000 constituents in 180 countries, ISACA® (www.isaca.org) is a leading global association for information systems assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. It offers the CISA®, CISM®, CGEIT® and CRISC® designations and the COBIT® framework.

Follow ISACA on Twitter: https://twitter.com/ISACANews

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addressed the challenges of scaling document repositories to this level; architectural approaches for coordinating data; search and storage technologies, Solr, and Amazon storage and database technologies; the breadth of use cases that modern content systems need to support; how to support user applications that require subsecond response times.
An edge gateway is an essential piece of infrastructure for large scale cloud-based services. In his session at 17th Cloud Expo, Mikey Cohen, Manager, Edge Gateway at Netflix, detailed the purpose, benefits and use cases for an edge gateway to provide security, traffic management and cloud cross region resiliency. He discussed how a gateway can be used to enhance continuous deployment and help testing of new service versions and get service insights and more. Philosophical and architectural approaches to what belongs in a gateway vs what should be in services were also discussed. Real examples of how gateway services are used in front of nearly all of Netflix's consumer facing traffic showed how gateway infrastructure is used in real highly available, massive scale services.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. End users now struggle to navigate multiple environments with varying degrees of performance. Companies are unclear on the security of their data and network access. And IT squads are overwhelmed trying to monitor and manage it all.