1 / 19

T I T R E

T I T R E. Fortinet 2013 Global Survey . Methodology. Survey company: Vision Critical (Independent third party – UK based ) Respondents: Worldwide survey conducted in 20 territories in October 2013 3,200 + active employees in full time employment aged 21 to 32

oliana
Download Presentation

T I T R E

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. T I T R E Fortinet 2013 Global Survey

  2. Methodology • Survey company: Vision Critical (Independent third party – UK based) • Respondents: • Worldwidesurveyconducted in 20 territoriesin October 2013 • 3,200+ active employees in full time employment aged 21 to 32 • University graduate level individuals • Owners of personal smartphones, tablets or laptops

  3. Agenda 1 BYOD State of Play 2 Bring Your Own Cloud 3 Emerging Technologies 4 Threat Literacy and Impact

  4. Status on Corporate BYOD Policy Does your organization have a corporate policy governing the use of personal devices at work? According to survey, over half of organizations have a BYOD policy in place today, with the majorityallowing the use of personaldevicesatwork

  5. Corporate Policy Contravention If your employer has / had a policy that prohibits the use of personal mobile devices in the work environment or for work purposes, have / would you ever go against this policy? Over half of respondentsaround the world are ready to contravenecompanypolicybanningBYOD

  6. Corporate Policy Contravention If your employer has / had a policy that prohibits the use of personal cloud applications such as Google Docs, Dropbox and Skype in the work environment or for work purposes, have / would you ever go against this policy?

  7. Corporate Policy Contravention If your employer has / had a policy that prohibits the use of Emerging Connected Technologies such as Internet enabled cars, gaming consoles and wearable gear such as Google Glass or smart watches in the work environment or for work purposes, have / would you ever go against this policy?

  8. Agenda 1 BYOD State of Play 2 Bring Your Own Cloud 3 Emerging Technologies 4 Threat Literacy and Impact

  9. Use of Personal Cloud Services for Work Purposes Which cloud data services do you have your personal account for and ever used for work purposes?

  10. Level of Trust in Cloud Services How much do you trust the cloud with storing your personal data? Almost one third of the cloud storage users sampled fully trust the cloud for storing their personal data, with only 6% citing aversion through lack of trust

  11. Business Data Evasion What types of work related data/information do you store in your personal cloud services? Only 13% of all respondents who have a personal cloud account(s) do not store business-related information on that (those) account(s)

  12. Agenda 1 BYOD State of Play Bring Your Own Cloud 2 3 Emerging Technologies 4 Threat Literacy and Impact

  13. Business Use of Connected Technologies Which of the following devices you own or might own in the future do you think will become useful for your work? Strong trend for wearable technologies to enter the workplacewithhalf of total respondentswilling to use thematwork

  14. Adoption of WearableTechnologyatWork When do you think wearable technology will be in widespread use in your workspace? Broad consensus on the adoption of wearabletechnologyatworkwith 16% (19% in Italy) expectingimmediate adoption

  15. Agenda 1 BYOD State of Play 2 Bring Your Own Cloud 3 Emerging Technologies 4 Threat Literacy and Impact

  16. Threat Literacy I understand each of the following words and phrases: 3 out 4 respondents do not fully comprehend terms like APTs, DDoS, Botnets and Farming

  17. Device Vulnerability To your knowledge, which (if any) of your personal devices have been compromised by third party cyber activity, e.g. computer viruses, malware etc? Globally, 59% of Gen-Y employees’ computers and 53% of their laptops have been compromised. Globally, 19% of users’ tables and smartphones have been compromised.

  18. Educating on Threat Landscape Do you feel you have any obligation to understand the security risks posed to your organization by the use of your own devices in work, or for work? Almost all respondents agree that they have an obligation to understand the security risks posed by using their own devices

  19. THANK YOU

More Related