AuditNet Survey of Bring your own Device (BYOD) - Control, Risk and Audit



Similar documents
Personal Data Security Breach Management Policy

Mobile Workforce. Improving Productivity, Improving Profitability

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

Public consultation paper

Internal Audit Charter and operating standards

The Cost Benefits of the Cloud are More About Real Estate Than IT

Key Steps for Organizations in Responding to Privacy Breaches

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company,

Data Protection Act Data security breach management

The Allstate Foundation Domestic Violence Program 2015 Moving Ahead Financial Empowerment Grant

Internet and Policy User s Guide

7 October Re: Themed Inspection into Third Party Personal Injury Claims. Dear

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

Change Management Process

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Mobile Telecom Expense Management

Chapter 7 Business Continuity and Risk Management

GUIDANCE FOR BUSINESS ASSOCIATES

HIPAA HITECH ACT Compliance, Review and Training Services

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

australian nursing federation

Watlington and Chalgrove GP Practice - Patient Satisfaction Survey 2011

Corporate Standards for data quality and the collation of data for external presentation

How To Ensure Your Health Care Is Safe

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

1. What insurance coverage is provided for Sigma Chi chapters that are members of the Risk Management Foundation?

Data Protection Policy & Procedure

PROTIVITI FLASH REPORT

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

FINANCIAL SERVICES FLASH REPORT

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

CCHIIM ICD-10 Continuing Education Requirements for AHIMA Certified Professionals (& Frequently Asked Questions for Recertification)

Phi Kappa Sigma International Fraternity Insurance Billing Methodology

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners

Malpractice and Maladministration Policy

National Australia Bank Limited Group Disclosure & External Communications Policy

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

April 29, 2013 INTRODUCTION ORGANIZATIONAL OVERVIEW PROJECT OVERVIEW

TrustED Briefing Series:

Small Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act. By: Michael James L$mbardin$

Audit Committee Charter

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Remote Working (Policy & Procedure)

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

BEST PRACTICES IN DELIVERING SUPERIOR CUSTOMER INTERACTIONS

In-House Counsel Day Priorities for Cloud Computing the benefits, potential risks and security for the future

WHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items

Process of Setting up a New Merchant Account

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Licensing Windows Server 2012 for use with virtualization technologies

Benefits of Contractor Workforce Solution Outsourcing - Risk Management. 10 December 2010 CXC Global Research

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives.

Network Security Trends in the Era of Cloud and Mobile Computing

EMR_HIE_Survey_DuvalCounty

CCHIIM ICD-10 Continuing Education Requirements for AHIMA Certified Professionals (& Frequently Asked Questions for Recertification)

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Web Development the Next Steps

FREQUENTLY ASKED QUESTIONS (FAQs)

First Global Data Corp.

TakeMeFishing.org Website Effectiveness Topline Findings October 12, 2010

A Quick Read on the State of Small Business and the Small Business Success Index 2009 Baseline Study of Small Business Success

The Ohio Board of Regents Credit When It s Due process identifies students who

FINANCE SCRUTINY SUB-COMMITTEE

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions.

CMS Eligibility Requirements Checklist for MSSP ACO Participation

Chris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava

Group Term Life Insurance: Table I Straddle Testing and Imputed Income for Dependent Life Insurance

Draft for consultation

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM

VCU Payment Card Policy

IN-HOUSE OR OUTSOURCED BILLING

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS

How To Ensure That The Internet Is Safe For A Health Care Worker

Succession Planning & Leadership Development: Your Utility s Bridge to the Future

ensure that all users understand how mobile phones supplied by the council should and should not be used.

Financial Accountability Handbook

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Training Efficiency: Optimizing Learning Technology

BYOD and Cloud Computing

2010 AT&T Business Continuity Study CENTRAL REGION (Missouri) Results

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Session 9 : Information Security and Risk

Legal Issues Bulletin

ARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM?

Massachusetts Department of Public Health Certifying a Wellness Program for a Wellness Tax Credit

Woodstock Multimedia, INC. Software/Hardware Usage Policy

IT Help Desk Service Level Expectations Revised: 01/09/2012

KIK s GUIDE FOR LAW ENFORCEMENT

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

Transcription:

AuditNet Survey f Bring yur wn Device (BYOD) - Cntrl, Risk and Audit The pace f technlgy mves much faster than managers and auditrs can understand and react, with updated plicies, prcedures and cntrls. Nt t lng ag wrkplace technlgy was simple. Cmpanies purchased and issued technlgy devices which emplyees accepted. The expectatin was that emplyees wuld keep business and persnal cmputing separate. With the change in technlgy we have witnessed a tsunami f technlgy enabled devices. The use f mbile devices by emplyees is clearly a trend that has ccurred in all businesses and rganizatins. The availability f this technlgy has blurred the lines f business vs persnal cnnectivity. Technlgy hungry prfessinals are quick t purchase the newest mbile phnes and devices the instant they are released. The rapid advance f technlgy and its applicatin in business is cnstantly evlving thereby frcing rganizatins t adapt befre cnsidering all the business risks and benefits. The risks assciated with the use f Mbile Cmputing t an rganizatin cntinues t grw as mre and mre emplyees use mbile devices in their daily wrk activities. As a result internal auditrs are nw n the frntline bth in understanding the technlgy as well as assessing the risks and auditing BYOD and mbile device plicy and usage. This survey seeks t build n existing surveys and research by reaching ut t the glbal audit cmmunity n the risk, cntrl and audit f BYOD (mbile device) plicies and usage. Executive Summary Despite all the literature and infrmatin available n the risks assciated with mbile devices and the BYOD explsin, the survey shws that this area is nt a high pririty fr internal auditrs. Internal audit and management risk tlerance fr this area appears t be quite high therefre senir management and bard have nt elevated the threat level fr BYOD and MDM. The pace at which BYOD has expanded int the wrkplace has clearly bypassed senir management and the bard which means that auditrs have nt

incrprated this area int wrk plans. At this pint the primary fcus fr internal audit may be educating senir staff, the Bard and Audit Cmmittee f the risks assciated and a call t actin n plicy, security t ensure that the risk is addressed and that the prper cntrls are put int place t prtect their rganizatins. Survey Key Issues Clse t 3/4 f thse wh respnded indicated that their emplyer allwed emplyees t bring their wn devices t wrk. The primary BYOD service allwed by cmpanies and rganizatin as reprted by survey respndents was e-mail fllwed by applicatin access via a Virtual Private Netwrk (VPN). Almst half the rganizatins allwed access t scial media. Clse t 80% said that their emplyer prvides cmpany wned mbile devices t emplyees while mre than half said that they did nt have a plicy fr mbile devices (cmmnly referred t as bring yur wn device r BYOD Mre than half that said their emplyer had a plicy indicated that it was nt well cmmunicated t staff. Almst tw thirds f thse wh said their emplyer had a plicy felt that it was nt thrugh r lacked the basic best practice elements Slightly mre than half required emplyees t sign a written agreement that utlines emplyer and emplyee rights and bligatins with respect t the devices and a cde f cnduct. Greatest cncern expressed by the auditrs was cnfidentiality f infrmatin fllwed by data breach r misuse Mre than 80% f the auditrs indicated that: a risk evaluatin cvering mbile devices has nt been perfrmed a training r awareness prgram cvering BYOD risks r cntrl has been cnducted they have nt audited this area they have nt included this area in their current r future audit plans Survey Cmments and Observatins The 2014 AuditNet Survey f BYOD Cntrl, Risk and Audit was circulated t the AuditNet cmmunity, LinkedIn grups, Twitter and ur extended netwrk f audit and cmpliance prfessinals. Mre than 300 auditrs respnded t the survey frm 8 different industry sectrs. Over 1/3 f the respnses were frm rganizatins with less than 1,000 emplyees and 40% frm between 1,000 and 10,000 emplyees. Almst 70% f the respndents wrked in audit departments with less than 10 staff. Clse t 3/4 f thse wh respnded indicated that their cmpanies allwed emplyees t bring their wn devices t wrk. Email was the mst widely accepted applicatin (95%) allwed by cmpany plicy. This is hardly surprising as email was the first Internet applicatin that received wide spread acceptance by bth emplyees and cmpanies. What has changed is that email is nw widely available frm mbile devices as well as frm ffice cmputers

When asked whether the rganizatin prvided cmpany wned mbile devices t emplyees mre than 75% respnded affirmatively. The caveat t this respnse is that we did nt ask fr a breakdwn fr the type f mbile device which means the majrity culd be mbile phnes. The next questin hwever reveals that while mbile devices are widely distributed acrss rganizatins the existence f a frmal plicy lags behind. Frty fur percent indicated that their rganizatin has a BYOD plicy. One f the standard best practices fr BYOD and MDM is the existence f a written rganizatinal/cmpany plicy. Even amng thse wh reprted a written plicy less than half indicated that emplyees are made aware f the plicy. On the psitive side mre than half reprted that their cmpany/rganizatin requires emplyees t sign a written agreement utlining emplyer/emplyee rights and bligatins with respect t mbile devices and a cde f cnduct. A signed agreement is a strng cntrl shuld the emplyee vilate the cmpany BYOD/MDM plicy. The primary areas cvered by the survey fr the plicy were access, acceptable usage and email with less cverage fr cnfiguratin, stred data, malware prtectin, applicatins, guest netwrking and SMS. Access, acceptable usage and email plicy fr mbile devices are the mst cmmn and easily added t plicy while the ther areas require mre technical expertise than mst rganizatins are willing t allcate time, effrt and resurces.

Reimbursement fr Mbil Devices On the issue f reimbursement fr mbile device 23% f the respndents indicated that their rganizatin had a plicy fr reimbursing csts assciated with mbile devices. Despite the lack f a reimbursement plicy alng with the high percentage f mbile devices prvided by emplyers (80%) it appears that emplyers are cvering the csts even withut a plicy. Hwever the reimbursement issue des nt delve int the details regarding they type f mbile devices s the lw respnse may indicate that while a frmal plicy may nt exist emplyers may still be cvering expenses fr mbile devices. These expenses culd include data plans, calling plans, messaging services and ther mbile applicatins. Mbile Device Tracking When Mre than half reprted that their rganizatin des nt maintain a list f supprted devices. The questin then becmes whether they maintain an inventry f devices and if they d nt then hw d they safeguard and cntrl the maintenance csts? Furthermre f thse that d maintain a list f supprted devices mre than 70% d nt prvide their emplyees with the list. S again hw d the emplyees knw whether they have a supprted device? Strength f Mbile Device Plicy As t the questin f hw strng their cmpany plicy is in relatin t mbile devices, mre than 60% indicated that they felt their cmpany s mbile device plicy was either nt thrugh r lacked cverage f the basics. A frmal written plicy utlines general rules abut device use, including the rights f bth emplyer and emplyees. The key is t balance prtecting cmpany interests with respecting wrkers' privacy rights and allwing fr cntinued persnal use f the device.the fllwing best practices utline the elements f a mbile device plicy as fllws: Vluntary r mandatry? Scpe. Wh is included in the plicy? Supprted devices. The BYOD prgram shuld specify the devices supprted and any limitatins (e.g., prhibiting an emplyee t "jailbreak" a smartphne that stres emplyer data). The minimum system requirements and cnfiguratins als shuld be addressed. Security requirements. As nted abve, individuals tend t take fewer steps t secure mbile devices than d businesses. The security f emplyer-prvided data n persnal devices may be imprved smewhat with advances in technlgy, such as the new iphne fingerprint scanner, but security risks will never be eliminated. Accrdingly, emplyers shuld cnsider deplying mbile device management (MDM) tls t imprve security, including requirements such as: Users must register their device with the MDM tl as a cnditin f access.

Users must use strng passwrds n the device. Encryptin fr all data sent utside the crprate firewall. Affirmatively blck access t "blacklisted" sites r applicatins. Enable remte wiping t the extent permitted by law. Cnsent t emplyer access. As a cnditin f enrllment in a BYOD prgram, emplyees shuld affirmatively cnsent and waive the emplyer's access, review and cllectin f data n the persnal device. The cnsent shuld be simply and clearly written and be brad enugh t cver all ptential needs f the business (e.g., t cmply with a curt rder; t assist an internal investigatin; t prvide technical supprt; etc.). Imprtantly, emplyees shuld be advised nt t expect privacy even in purely persnal infrmatin. If cnsent is given in mre than ne manner (e.g., a handbk acknwledgment; an electrnic signature during the MDM installatin prcess), ensure that the language is cnsistent. When asked what whether their plicy cvered sme f thse best practices the respnses are summarized in the fllwing chart. Respnses f n r I dn t knw represent weak r nn- existent BYOD plicy issues. Cmpanies must make sure that their plicies cver the basic elements. These represent areas f high pririty fr internal audit t address in reviewing existing plicies r presenting t management a best practice mdel fr cnsideratin. Mbile device security is a high pririty issue fr management as well as auditrs. The majrity f respndents reprted that anti-malware and firewall plicies are in place. The remaining security plicies were nt in place based n the majrity f thse surveyed. Less than ne furth f thse wh tk the survey reprted that their cmpany had nt perfrmed a risk assessment f mbile device usage. Widespread use f mbile devices and their accmpanying security risks represents a sign that auditrs shuld nt ignre. Even mre cncerting is the fact that ne/third f thse taking the survey did nt knw if a risk assessment was perfrmed. Audit shuld be part f the risk assessment prcess and if they were then perhaps a mre accurate respnse wuld have resulted fr this questin. Training and awareness represent key elements f an effective BYOD and MDM prgram. Letting emplyees knw what is expected f them, as far as maintaining the security f their persnal mbile devices, desn t always mean they understand. Cnducting training and awareness prgrams fr device privacy and security can help drive certain pints and reinfrce the BYOD plicy established by yur rganizatin. This is an area that auditrs shuld lk fr when perfrming a review f BYOD and MDM. The greatest cncern based n the survey participants was cnfidentiality f infrmatin fllwed by data breach r misuse. Data lss, adverse publicity and integrity f data were the least cncern areas fr thse respnding. There areas hwever relate directly t reputatin management and we wuld expect auditrs t be highly cncerned. Cnfidentiality f infrmatin is imprtant and perhaps because f press cverage f these lapses directly relates t their level f cncerns by thse taking the survey.

Given the fact that BYOD in firmly embedded in crprate culture and high likelihd f a risk expsure ccuring yu wuld think that audit departments wuld have wrked n acquiring the necessary skills t audit this area. Yet apprximately 55% indicated that their department is lacking the skills t audit BYOD. That leads int the respnses t the next several survey questins pertaining t perfrming risk assessments and/r audits f BYOD. The majrity f thse cmpleting the survey has nt perfrmed a risk assessment fr this area nr have they included BYOD in their current r shrt range audit plans. The failure t cnsider this high visibility, high likelihd, high threat expsure event as part f an verall enterprise wide risk assessment and nt include in this area in bth the shrt and lng term audit is bth shrt sighted and ill advised. Internal audit must begin assessing the risk and including audits f BYOD and MDM starting with plicy and then mving n t device management, cntrl and security. If this area has been a fcus fr senir management and r the audit cmmittee, it has nt been cmmunicated t internal audit as BYOD is under cnsideratin by nly 40% f the cmpanies accrding t the survey respnses. Internal audit must bring this area t the attentin f bth senir management, the audit cmmittee and the Bard. By raising the threat level and expsure shuld impact tne at the tp and raise the pririty fr bth risk assessment and audit planning. When asked whether internal audit was evaluating MDM t determine adequacy t prtect prprietary and sensitive infrmatin r BYOD practices t ensure cmpliance with privacy and data security standareds the majrity f thse respnding t the survey indicated they these areas were nt under review. If these areas are nt being reviewed there is an increased risk f expsure t areas that audit identified as critical i.e. privacy and security f sensitive infrmatin and data security. The survey clearly demnstrates that the trend n bring yur wn devices r BYOD is firmly entrenched in rganizatins based n the respnses. Mbile device management (MDM) and plicy issues hwever are nt keeping pace with rganizatin implementatin and emplyee usage f these devices. Hwever the trend that is mst revealing is that many rganizatins are clearly nt addressing the risks that usage f these devices pse and auditrs have nt built these factrs int current r planned audit cverage. Based n the (1) vlume f mbile device usage; (2) risks that use f these devices represents; (3)likelihd f a risk event and the ptential impact means that management and audit shuld be paying mre attentin and resurces t BYOD and MDM. Jim Kaplan, CIA, CFE AuditNet Funder

The summary, detailed results including charts/graphs are available nline by clicking here!