Bonus $100
Fury vs Usyk
IPL 2024
Mumbai Indians vs Kolkata Knight Riders
Paris 2024 Olympics
PROMO CODES 2024
UEFA Euro 2024
Users' Choice
88
87
85
69

BYOD security a key focus for HK CIOs

10 May 2017
00:00
Read More

One in three Hong Kong CIOs believe that a lack of employee knowledge and skills around data security is the most significant security risk their organization will face in the next five years, according to Robert Half Hong Kong.

A survey commissioned by the specialist recruitment consultancy finds that Hong Kong CIOs are stepping up the fight against the security risks posed by the widespread adoption of bring-your-own-device (BYOD) practices.

With nearly three in four (74%) local CIOs allowing employees to access corporate data on their personal devices, the security risks of BYOD have become a top priority.

Nearly all (99%) CIOs are taking steps to protect their company from potential data breaches in light of the threat posed by BYOD, the research shows.

In addition, 57% have deployed mobile device management technologies to enforce enhanced protection on employee mobile devices, 56% require workers to sign an acceptable use policy 51% are providing training to their staff on maintaining security with using their mobile devices and 45% are using authentication software.

The growing focus on security is meanwhile generating an increased demand for IT security specialists with the niche skills needed to protect companies against data security risks.

But 98% of Hong Kong CIOs report finding it challenging to source skilled technology professionals, with 23% stating that professionals with mobile security skills are in top demand.

“With such a highly mobile and device driven workforce in Hong Kong, it is no surprise that companies see potential in boosting productivity and engagement by offering BYOD options,” Robert Half Hong Kong managing director Adam Johnston said.

“However, these practices pose a significant cyber-security threat and demand that corporate networks and data are protected, that mobile device management strategies are put in place, and that security policies are developed.”

.

Related content

Rating: 5
Advertising