Gizmologi.com
TRENDING
  • Buying Guides
  • Pixel 3 Review
  • Honor 8X Review
  • Android 9 Pie
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
  • News
  • Reviews
  • How To
  • Apps
  • Devices
  • Compares
  • Games
  • Photography
  • Security
SUBSCRIBE
  • Home
    • Home – Layout 1
    • Home – Layout 2
  • News
  • Reviews
  • How To
  • Apps
  • Devices
  • Compares
  • Games
  • Photography
  • Security
No Result
View All Result
Gizmologi.com
No Result
View All Result
Home News

Using Personal Devices to Access Corporate Data Vulnerable to Cyber Attack

by Bambang Dwi Atmoko
April 16, 2017
in News
0
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Compared to other countries in Southeast Asia and Korea, Indonesia is in the top ranking for the category of the number of companies that allow employees to bring and use personal devices for work.

Four of 10 (41 percent) workers believe that their IT department encourages the use of personal devices for reasons of increased productivity. Consequently, 68 percent of the Indonesian workers utilize personal devices to check work email.

The findings revealed in the report of the VMware Digital Workspace Study released last week (4/12) in Jakarta, Indonesia. According to VMware, the significance of the number of workers who use personal devices for work without the company’s consent this can increase the vulnerability to attempts of hacking and cyber attacks.

Even the use of personal devices to access office data is considered worthy of serious attention because of the great risk that could potentially threaten security system companies in Indonesia. According to the survey, 1 in 3 workers in Indonesia (34 percent) turned out to use their personal devices for work without their knowledge and without approval from the IT team of the company first.

Then as many as 38% of respondents even said that they do not know and do not comply with standard airworthiness IT which has been determined by the company related to the use of personal devices for work. This condition, of course, can potentially open the door wide to the inclusion of efforts to attack and hacking data, while increasing the risk to the business of the company.

Santoso Suwignyo, Senior Director of Technical Services, Southeast Asia, and Korea, VMware, said IT departments need to understand the implications or the meaning of security from the implementation of the program of BYOD (Bring Your Own Devices) in a haphazard manner without first adopting a comprehensive framework and safe.

“Findings from this survey confirms the fact that the organization or company that does not have a digital workspace that is safe to make them increasingly vulnerable and exposed to various loopholes that become the entry point to the network, especially if users neglect will be the requirements and policies of the IT security company and dodged when they think that the company is considered not able to meet their need for availability of services-IT services as desire them,” said Santoso.

Santoso Suwignyo, Senior Director of Technical Services, Southeast Asia dan Korea, VMware.

The challenges that arise from the adoption of BYOD is not just about security issues. Seventy percent of respondents said that they face problems when trying to access the application-application support work. Problem top, among others, is “too many passwords to remember” (32 percent) and “the application can not be accessed perfectly on different devices” (28 percent). To overcome these problems, employees tend to use the same password for the entire device and the application (35 percent) that their use or write it in notes and save it on their mobile devices (32 percent).

The use of the same password to access all work applications and devices that are used to support the productivity of the work actually brings security risks for the company. The risk of growing when more and more employees create simple passwords that can easily be hijacked simply by try to enter a password repeatedly or trial and error.

Once the password can be read the party who does not have the authority, then the entire data – good data is the work/office and personal data – can be accessed by people not responsible, including also information on other important business within the network.

Santoso Suwignyo also stressed that companies need to have thought out the issue of security and the fulfillment of regulatory standards. Since a long time has appeared disharmony between the priorities of IT and the demands of the user. End-users want a system that is simple yet efficient in accessing the diverse applications they need. While part of IT especially attach great importance to the certainty of control and security. Often the company just simply applying the system security-oriented on the level of ease of use

Often the company just simply applying the system security-oriented on the level of ease of use. The use of solutions such as VMware Workspace ONE allows the company to achieve alignment between the provision of security policy that is comprehensive and meets the specified requirements, with ease of use and not confusing for the employees,” he said.

 

 

ShareTweetPin

Related Posts

ColorOS 15 Officially Debuts, Here Are Some Highlighted New Features
News

ColorOS 15 Officially Debuts, Here Are Some Highlighted New Features

November 27, 2024
First look at the new Android 9 “Pie” on the Samsung Galaxy S9
How To

First look at the new Android 9 “Pie” on the Samsung Galaxy S9

October 26, 2024
Google Pixel 3 camera bug brings back Nexus 5 nightmares
News

Google Pixel 3 camera bug brings back Nexus 5 nightmares

October 23, 2024
‘Fortnite’ named Ultimate Game of the Year at the Golden Joystick awards
Games

‘Fortnite’ named Ultimate Game of the Year at the Golden Joystick awards

October 22, 2024
News

Apple’s AI development is “two years late”, ready to take off next year

October 21, 2024
How to take a screenshot, edit, and share on the Galaxy S9 CAPTURE
How To

How to take a screenshot, edit, and share on the Galaxy S9 CAPTURE

October 18, 2024
Next Post

Here's Main Feature of IDOS, the Indonesia Operating System Developed by Advan

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • 308 Followers

Recommended

1 billion Redmi smartphones sold in the past decade!

December 3, 2023

First day sales of vivo X200 Series exceeded CNY2 million in China, ready to enter Indonesia Market?

October 20, 2024

The “Anti-lagging” Luna G Smartphone Projected to be Sold 60 Mio Unit a Month in Indonesia

April 21, 2017

OPPO A55 released in Indonesia, smartphone for midrange

March 1, 2022

The official leak of the realme Race, a flagship with Snapdragon 888

December 2, 2020

Honor 200 Pro Using Snapdragon 8s Gen 3 Debuts in China

May 28, 2024
  • About
  • Advertise
  • Privacy & Policy
  • Contact

DISCLAIMER

This demo site is only for demonstration purposes to JNews WordPress theme.

© 2018 JNews. All right go to their respective owners.

No Result
View All Result
  • Homepages
    • Home – Layout 1
    • Home – Layout 2
  • Reviews
  • How To
  • Apps
  • Devices
  • Games

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Malcare WordPress Security