How Unauthorized Applications Impact Security and How You Can Take Back Control

by Sophos

Mar 15, 2010

Download A workforce, reared on social networking and mobile technologies, is bringing a different perspective to how computers are used within an organization. With a mindset that is highly tuned to sharing information with friends, employees are running unauthorized applications on their corporate-owned PCs unbeknownst to their IT departments. Although internet technologies like instant messaging (IM) can bring business value in helping employees communicate and work collaboratively, they also introduce a new level of risk that IT must manage´┐Żoften reactively. Most notably, unauthorized applications, and the devices used to transport then, significantly increase the risk of data loss and malware infection. Both of which come with a hefty price tag. According to the Ponemon Institute, the average cost of a data breach in 2009 was $204 per record compromised. The average total cost per reporting company was more than $6.75 million per breach and ranged from $750,000 to almost $31 million.