2005
'BYOD' first coined in an academic report1

2007
First smartphones released

2011
LuizSec use SQL injection attack to get into Sony Pictures website, compromising over 1 milllion accounts2

Researches at McAfee reveal details in advanced persistent threat attack called 'Night Dragon'3

2012
9000,000 apps, 25 billion Android app downloads4

Developer pretended to be Rovio, known for Anggry Birds franchise5

Just 17 malicious apps totaled more than 700,000 downloads5

Shamoon attack used for cyber espionage in the energy sector6

2013
Mobile malware threats grew at a rate of 614 percent to 276 259 total malicious apps7

Garner estimate the low end of the range of hourly cost for downtime of computer networks at $42,0008

2014
First case of Android Trojan spreading via mobile botnets discovered9

24,000 Android devices are hit by XXX.apk mobile botnet10

Heartbleed bug renders millions of devices vulnerable11

TODAY...
"BYOD strategies are the most radical changes to the economics and the culture of client computing in business in decades" - Garner12




  SOURCE:
 1.  ETH Zurich: http://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf
 2.  ZDNet: http://www.zdnet.com/sony-hacked-again-in-lulzsec-breach-4010022607/
 3.  McAfee: http://www.mcafee.com/uk/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf
 4.  Android Official Blog: http://officialandroid.blogspot.co.uk/2012/09/google-play-hits-25-billion-downloads.html
 5.  TrendMicro: http://blog.trendmicro.com/trendlabs-security-intelligence/byod-a-leap-of-faith-for-enterprise-users/
 6.  IT Pro: http://www.itpro.co.uk/mobile/19944/surge-byod-sees-710-employees-using-their-own-devices#ixzz2sSniLt8Wli>
 7.  Juniper: http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats-continue-ram-nyse-jnpr-1029552
 8.  Gartner: http://www.spirent.com/~/media/White%20Papers/Broadband/PAB/Running_on_Faith_Whitepaper.pdf
 9.  ZDNet: http://www.zdnet.com/first-case-of-android-trojan-spreading-via-mobile-botnets-discovered-7000020292/
 10.  The Inquirer: http://www.theinquirer.net/inquirer/news/2322028/24-000-android-devices-are-hit-by-xxxxapk-mobile-botnet
 11.  The Telegraph: http://www.telegraph.co.uk/technology/internet-security/10764739/Heartbleed-bug-millions-of-Android-devices-still-vulnerable.html
 12.  Gartner: http://www.gartner.com/newsroom/id/2466615
 13.  Ovum: http://www.itpro.co.uk/mobile/19944/surge-byod-sees-710-employees-using-their-own-devices
 14.  Cisco: http://newsroom.cisco.com/release/854754/Cisco-Study-IT-Saying-Yes-To-BYOD
 15.  Nielsen: http://www.nielsen.com/us/en/newswire/2012/state-of-the-appnation-%C3%A2%C2%80%C2%93-a-year-of-change-and-growth-in-u-s-smartphones.html
 16.  Symantec: https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Ponemon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf
 17.  Gartner: http://www.infoworld.com/d/security-central/how-much-should-you-spend-it-security-306

Need help finding the product that's right for your business?

Contact us