Enterprises are increasingly allowing employees to access unsupported applications and devices over their networks, in spite of the security risks, according to a Cisco study.

Alison Diana, Contributing Writer

June 24, 2010

2 Min Read

The siren call of Facebook, YouTube, and Twitter are too tempting for many employees to ignore from their workplace, according to a new study conducted for Cisco by InsightExpress.

In the study of 512 IT decision-makers in the United States, Japan, Germany, China, and India, 56% determined that employees used unsupported applications. Of those, 68% were accessing social networking sites, the report found. In addition, 47% were running collaborative sites such as Google Apps and 47% ran peer-to-peer sites, according to the study. One-third were using cloud applications such as Amazon S3, the research showed.

Employees are estimated to spend an average of between 30 and 75 minutes per day on non-business online activities.

"As the lines between personal and business computing increasingly blur, it is becoming clear that employees are going to use social networking and personal devices whether permitted or not," said Fred Kost, director of security solutions at Cisco, in a statement.

Also, 41% of those surveyed found that employees are using unsupported devices, according to the poll. This can have serious repercussions: 40% reported their company had lost data due to the use of unsupported network devices, the study said.

Yet corporations predict they will allow employees to use personal devices on the network within the next year, with 14% stating they are "very likely" and 39% saying they are "likely" to adopt this policy, the poll found. However, 20% are "unlikely" and 21% are "very unlikely," according to the study.

One reason: Overly strict policies can harm a company's ability to attract and retain well-qualified employees under 30, said 71% of those polled.

"Increasingly, unapproved and unmanaged personal devices in the corporate environment are hastening the need for more intelligent security management. These 'solutions' must deal with difficulty of protecting individuals and corporations while providing a positive user experience and corporate data access from any device, anywhere, anytime," said Chris Christiansen, program VP of IDC's security products and services group, in a statement.

Unauthorized users, social networking, and new applications are the leading IT risks to organizations, the survey found. Other threats included unsupported mobile devices, unsupported other devices, collaborative applications, and cloud applications, according to the report.

About the Author(s)

Alison Diana

Contributing Writer

Alison Diana is an experienced technology, business and broadband editor and reporter. She has covered topics from artificial intelligence and smart homes to satellites and fiber optic cable, diversity and bullying in the workplace to measuring ROI and customer experience. An avid reader, swimmer and Yankees fan, Alison lives on Florida's Space Coast with her husband, daughter and two spoiled cats. Follow her on Twitter @Alisoncdiana or connect on LinkedIn.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights