Acquired Electronics360

Mobile Devices

Apple Devices May Pose a Workplace Liability

25 August 2015

Centrify Corp. has commissioned a survey to find the level of use and the security compliance of Apple devices in the workplace. The survey, conducted by Dimensional Research, concludes that a lack of security and management of the number of Apple devices used may expose companies to potentially “significant liabilities.”

Some 2,249 U.S. workers participated and 45% of them say that they use at least one Apple device in the work environment. While individuals and non-corporations owned 63% of these devices, they were used to access work email, corporate documents and business applications. Other findings include:

  • 59% of Macs are used to access confidential company information
  • 65% of Macs are used to access sensitive or regulated customer information
  • 51% of iPhones in the workplace are used to gain access to business applications
  • 58% of iPads in the workplace are used to gain access to business apps

As to the security levels of the devices used, 51% of all devices are secured solely by a single word or series of numbers password. Most of the devices, 58%, did not have strong password enforcement software and 56% of users said they share their passwords.

According to the survey, 17% of Apple devices have a company-supplied password manager and 28% have company-provided device management solutions onboard. Finally, 35% of the devices have encryption of stored data enforced by the company.

Centrify says that customer data represents the biggest liability. Healthcare records alone are subject to fines and legal action when compromised, as well as employment records.

Apple recently issued an application with iOS 8.4.1 that patched a hole in the sandbox app, which made it possible for iOS devices operating in managed environments to leak configuration and credential data to third-party apps. The vulnerability involved a permissions issue in the managed app configuration system introduced with iOS 7, which makes it easier for enterprises to administer iOS devices by providing a built-in mechanism for distributing and storing customized app configuration data, such as server URLs and corporate network information. Although the intent of the system was to limit access to files to the apps involved, the files were readable by any app installed on the device.

To contact the author of this article, email engineering360editors@ihs.com

Related links:

For Centrify’s approach visit: www.centrify.com/apple.



Powered by CR4, the Engineering Community

Discussion – 0 comments

By posting a comment you confirm that you have read and accept our Posting Rules and Terms of Use.
Engineering Newsletter Signup
Get the Engineering360
Stay up to date on:
Features the top stories, latest news, charts, insights and more on the end-to-end electronics value chain.
Advertisement
Weekly Newsletter
Get news, research, and analysis
on the Electronics industry in your
inbox every week - for FREE
Sign up for our FREE eNewsletter
Advertisement

CALENDAR OF EVENTS

Date Event Location
30 Nov-01 Dec 2017 Helsinki, Finland
23-27 Apr 2018 Oklahoma City, Oklahoma
18-22 Jun 2018 Honolulu, Hawaii
Find Free Electronics Datasheets
Advertisement