The State Of SMB Security: BYOD And Security Violations On The Rise

White paper reports that the Bring Your Own Device (BYOD) trend of employees using personal mobile devices and laptops for work is increasing among SMBs

September 14, 2012

1 Min Read

PRESS RELEASE

CUPERTINO, Calif., Sept. 13, 2012 /PRNewswire/ -- As resellers look to improve their SMB customers' security posture while reducing their security management costs, they can rely on the cloud-client architecture of the Trend Micro(TM) Smart Protection Network(TM) to enable faster access to threat intelligence and protection.

Based on a survey of over 100 SMB IT Security Providers during June and July 2012, and its own independent analysis, Osterman Research looked into the current state of SMB security and the benefits of faster protection and published the white paper, "The Cloud Advantage: Increased Security and Lower Costs for SMBs."

The white paper reports that the Bring Your Own Device (BYOD) trend of employees using personal mobile devices and laptops for work is increasing among SMBs. The typical SMB employee uses a number of endpoint devices - a desktop computer, a laptop, a smartphone, a tablet, and home computers with various applications on them, all vectors through which malware can enter their SMB organization's network. Cyber criminals employ multiple compromised endpoints and social networking to reach large numbers of targets, targeting the more popular mobile devices such as Android(TM) and iOS.

The Osterman Research survey also found:

-- Android usage gained the largest increase in SMB, with the number of

Google Androids being used in SMBs increasing 7.1 percent from 2011. The

number of Apple iPhones being used in SMBs increased 3.1 percent, and

Apple iPad usage has increased 1.9 percent from 2011.

-- During a typical month 4.3 percent of endpoints become infected, which

translates to an infection rate of 52.1 percent annually.

-- During the past several years a growing number of organizations reported

security violations through their use of web and email. Between 2007 and

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights