Centrify survey finds unmanaged Apple devices a corporate liability

A new survey has found that user-owned Apple devices are massive security threat to businesses.

A new survey has found that user-owned Apple devices are massive security threat to businesses.

The survey, by Dimensional Research, was commissioned by cyber-threat security company, Centrify Corporation, to determine penetration and security compliance of Apple devices in the workplace.

Of the total 2249 US workers surveyed, 45 per cent said they used at least one Apple device for work purposes.

Results showed the majority of devices (63 per cent) were owned by the user as opposed to the company, and are used to access work email, corporate documents and business applications.

The study also discovered that 59 per cent of Macs are used to access confidential company information and 65 per cent are used to access regulated customer information.

Also 51 per cent of iPhones in the workplace are used to gain access to business applications with 58 per cent of iPads used for the same purpose.

Despite the popularity of Apple devices in the workplace, the survey found businesses do not invest enough resources to secure or manage them.

Read more: Parallels Desktop 11 for Mac launches with Windows 10 Integration and OS X El Capitan readiness

The survey found 51 per cent of devices were secured by a password consisting of just a single word or series of numbers whilst 58 per cent did not have adequate software installed to enforce strong passwords.

Additionally, more than half of respondents (56 per cent) reported sharing their passwords with others. Only 17 per cent of Apple devices were installed with a company-supplied password manager, and only 28 per cent of devices had company-provided management solutions installed.

“Centrify’s Apple survey spotlights the massive exposures that occur when devices do not comply with standard corporate security policies. In particular, customer data represents a huge liability,” said Centrify senior vice president of products and marketing, Bill Mann.

Read more: Acronis launches new True Image

"Disclosure of regulated information such as healthcare records could expose corporations to fines and other legal action. Most importantly, there are solutions on the market today that can handily secure Apple devices without sacrificing user productivity. It’s time for IT to take action,” he said.

Read more: Microsoft announces new enterprise mobility services

Join the CSO newsletter!

Error: Please check your email address.

More about AppleBillCentrifyMacsMannMicrosoftParallels

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by By Holly Morgan

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place