How Unauthorized Applications Impact Security and How You Can Take Back Control
Click here to download now
Overview: A workforce, reared on social networking and mobile technologies, is bringing a different perspective to how computers are used within an organization. With a mindset that is highly tuned to sharing information with friends, employees are running unauthorized applications on their corporate-owned PCs unbeknownst to their IT departments. Although internet technologies like instant messaging (IM) can bring business value in helping employees communicate and work collaboratively, they also introduce a new level of risk that IT must manage—often reactively. Most notably, unauthorized applications, and the devices used to transport then, significantly increase the risk of data loss and malware infection. Both of which come with a hefty price tag. According to the Ponemon Institute, the average cost of a data breach in 2009 was $204 per record compromised. The average total cost per reporting company was more than $6.75 million per breach and ranged from $750,000 to almost $31 million.