190 likes | 320 Views
T I T R E. Fortinet 2013 Global Survey . Methodology. Survey company: Vision Critical (Independent third party – UK based ) Respondents: Worldwide survey conducted in 20 territories in October 2013 3,200 + active employees in full time employment aged 21 to 32
E N D
T I T R E Fortinet 2013 Global Survey
Methodology • Survey company: Vision Critical (Independent third party – UK based) • Respondents: • Worldwidesurveyconducted in 20 territoriesin October 2013 • 3,200+ active employees in full time employment aged 21 to 32 • University graduate level individuals • Owners of personal smartphones, tablets or laptops
Agenda 1 BYOD State of Play 2 Bring Your Own Cloud 3 Emerging Technologies 4 Threat Literacy and Impact
Status on Corporate BYOD Policy Does your organization have a corporate policy governing the use of personal devices at work? According to survey, over half of organizations have a BYOD policy in place today, with the majorityallowing the use of personaldevicesatwork
Corporate Policy Contravention If your employer has / had a policy that prohibits the use of personal mobile devices in the work environment or for work purposes, have / would you ever go against this policy? Over half of respondentsaround the world are ready to contravenecompanypolicybanningBYOD
Corporate Policy Contravention If your employer has / had a policy that prohibits the use of personal cloud applications such as Google Docs, Dropbox and Skype in the work environment or for work purposes, have / would you ever go against this policy?
Corporate Policy Contravention If your employer has / had a policy that prohibits the use of Emerging Connected Technologies such as Internet enabled cars, gaming consoles and wearable gear such as Google Glass or smart watches in the work environment or for work purposes, have / would you ever go against this policy?
Agenda 1 BYOD State of Play 2 Bring Your Own Cloud 3 Emerging Technologies 4 Threat Literacy and Impact
Use of Personal Cloud Services for Work Purposes Which cloud data services do you have your personal account for and ever used for work purposes?
Level of Trust in Cloud Services How much do you trust the cloud with storing your personal data? Almost one third of the cloud storage users sampled fully trust the cloud for storing their personal data, with only 6% citing aversion through lack of trust
Business Data Evasion What types of work related data/information do you store in your personal cloud services? Only 13% of all respondents who have a personal cloud account(s) do not store business-related information on that (those) account(s)
Agenda 1 BYOD State of Play Bring Your Own Cloud 2 3 Emerging Technologies 4 Threat Literacy and Impact
Business Use of Connected Technologies Which of the following devices you own or might own in the future do you think will become useful for your work? Strong trend for wearable technologies to enter the workplacewithhalf of total respondentswilling to use thematwork
Adoption of WearableTechnologyatWork When do you think wearable technology will be in widespread use in your workspace? Broad consensus on the adoption of wearabletechnologyatworkwith 16% (19% in Italy) expectingimmediate adoption
Agenda 1 BYOD State of Play 2 Bring Your Own Cloud 3 Emerging Technologies 4 Threat Literacy and Impact
Threat Literacy I understand each of the following words and phrases: 3 out 4 respondents do not fully comprehend terms like APTs, DDoS, Botnets and Farming
Device Vulnerability To your knowledge, which (if any) of your personal devices have been compromised by third party cyber activity, e.g. computer viruses, malware etc? Globally, 59% of Gen-Y employees’ computers and 53% of their laptops have been compromised. Globally, 19% of users’ tables and smartphones have been compromised.
Educating on Threat Landscape Do you feel you have any obligation to understand the security risks posed to your organization by the use of your own devices in work, or for work? Almost all respondents agree that they have an obligation to understand the security risks posed by using their own devices