IT leaders are facing major work device blind spots – and it's putting security at risk
The use of unauthorized devices is putting enterprises at huge risk
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Nearly a quarter of UK businesses detect unauthorized devices accessing corporate data at least every month, with nearly half having experienced a data breach caused by unmanaged devices during the last year alone.
In a recent survey, more than two-thirds (67%) of IT leaders told endpoint management provider Scalefusion they lack complete visibility into the work devices used across their organization.
30% off Keeper Security's Business Starter and Business plans
Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?
More than half (58%) reckoned they had 'mostly visible' systems with 'a few blind spots'.
However, thanks to the shift to hybrid and remote working, 64% said they'd found previously unknown devices or applications being used for work purposes in the last year.
This is leading to frequent security incidents among affected companies, the study found. For example, of the 48% who experienced breaches from unmanaged devices, 35% said they were being attacked at least once a month.
"These findings confirm what we've been hearing from businesses across the UK and Ireland – there's a critical gap between the security challenges organisations face and their ability to address them effectively," said Sally King, Scalefusion's channel sales manager for the UK and Ireland.
"What businesses need is visibility and simplification – a unified approach that brings all endpoints under one management umbrella rather than juggling multiple disconnected systems.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
One-in-five employees don't know whether their organization authorizes the use of personal devices for work, yet 40% are doing so on a daily basis. Three-quarters said this was for easier access while 56% also highlighted flexibility.
Tool sprawl is exacerbating the problem
Notably, attempts to address security challenges may actually be making matters worse, Scalefusion warned. Nearly six-in-ten companies now use four or more different endpoint security tools, causing significant operational challenges.
More than half (53%) said that this has led to increased administrative overhead, while 35% reported a lack of interoperability between systems. Similarly, 41% said they'd seen higher costs and 37% complained of critical gaps in data visibility.
Only 7% of organizations claimed that their multi-tool approach wasn't causing them any problems at all.
There were some positive trends, however. Nearly half (43%) of companies now use endpoint management platforms for employee onboarding, and 68% of IT leaders are keen to cut hands-on time per device through the use of zero-touch deployment solutions.
"This research captures something we've been observing for a while: the tools meant to protect organizations are often the same ones creating their biggest blind spots," said King.
"IT teams are drowning in dashboards while employees quietly work around systems that slow them down."
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Amazon’s ‘go build it’ AI strategy is a perfect fit for OpenAI’s big enterprise pushNews OpenAI and Amazon are both vying to offer customers DIY-style AI development services
-
Cyber resilience tunnel vision is leaving enterprises open to external threatsNews Many enterprises are overlooking supply chain risks as part of their cyber resilience strategies
-
Using AI to generate passwords is a terrible idea, experts warnNews Researchers have warned the use of AI-generated passwords puts users and businesses at risk
-
Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company respondedNews Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking
-
‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technologyNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Notepad++ hackers remained undetected and pushed malicious updates for six months – here’s who’s responsible, how they did it, and how to check if you’ve been affectedNews Hackers remained undetected for months and distributed malicious updates to Notepad++ users after breaching the text editor software – here's how to check if you've been affected.
-
CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do thatNews The incident at CISA raises yet more concerns about the rise of ‘shadow AI’ and data protection risks
-
Former Google engineer convicted of economic espionage after stealing thousands of secret AI, supercomputing documentsNews Linwei Ding told Chinese investors he could build a world-class supercomputer
-
90% of companies are woefully unprepared for quantum security threats – analysts say they need to get a move onNews Quantum security threats are coming, but a Bain & Company survey shows systems aren't yet in place to prevent widespread chaos

