View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
January 9, 2015

Christmas gadgets could lead to BYOD hacking

Your new tablet or smartphone may not be protected by security policies.

By Jimmy Nicholls

Tablets, smartphones and wearable tech bought for Christmas could increase the risk of firms being hacked, according to Ernst & Young (EY).

Workers returning after the December break may wish to use their new devices as part of their job, yet a lack of spending around bring your own device (BYOD) policies could leave the gadgets open to hackers.

Massimo Cotrozzi, director of cybercrime investigations at EY, said "We are only in the first few days of 2015, but we are already seeing issues with companies leaving themselves exposed to this phenomenon."

"The new smart mobile/tablet and wearable tech that employees bring into the office could be now connecting via the corporate wireless networks to external cloud systems which, in the best case, have not been appropriately protected, let alone tested."

"Organisations that are unprepared could be caught napping while hackers are getting in, using employee devices, via the back door."

84% of companies worldwide consider mobile security a medium or high priority, according to figures from EY, yet only two-fifths are planning on increasing spending to cover the threat posed by BYOD.

"Businesses also need to be prepared for when the worst occurs and have a clear strategy to respond to and clean up after an attack," Cotrozzi added.

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

"Employees must understand how to preserve evidence left by the perpetrators and must also establish contingencies to deliver an instant response to reassure customers and prevent reputational damage."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU