More people are bringing their personal devices to work, which can expose a company to new threats. As tablets and smartphones are entering the workplace en masse, we polled business managers and IT managers on how they’re handling the bring-your-own-device (BYOD) trend.A majority of respondents report at least some progress towards controlling the proliferation of mobile devices, or at least ensuring some security on devices allowed to connect to company networks. Yet, a large minority–33 percent–either have no policies yet or don’t control which devices are allowed on their networks.Sixty percent of IT managers say they use wireless access points or network access control (NAC), or only allow mobile devices that they issue with pre-installed security and management tools. However, 26 percent haven’t developed policies for mobile devices yet, and 7 percent have policies but don’t actively enforce them.Similarly, 19 percent of business managers say they only allow authorized devices, while 25 percent only allow devices they’ve issued and pre-configured. However, 36 percent report that anyone can bring whatever devices they like to work. Software to provide at least minimum levels of anti-malware and encryption are readily available. The tools to enforce that devices lacking protection are not allowed to connect to the network are also easy to find, and often built into wireless access points.Therefore, managers should be looking at the potential for lost or stolen data that could be exposed via mobile devices. They should measure the costs of enforcing a mobile device security policy against the possible costs of re-creating data or handling a lawsuit or legal investigation, should data be compromised. Given that lawsuits or legal penalties can run into millions of dollars, there’s really no excuse not to at least consider managing the mobile devices that can access your network. For more, read our guide to mobile device management for small business. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe