Bring your own device has reached epidemic levels, report claims

Bring your own device has reached epidemic levels, report claims

BYOD is now widespread - with 78% of employees doing it; and security teams struggling to manage, says new research from Ivanti.

Published on 13th October 2025

Bring your own device (BYOD) is becoming the rule rather than the exception in workplaces, new research from Ivanti has claimed.

The company found personal phones, laptops and hotspots are increasingly being used for work tasks, often outside the control of IT departments.

The study found nearly half (44%) of workers had used their personal phone for work, while 37% had used it as a hotspot and 32% had used their own computer.

BYOD regardless of policy

Three out of four IT workers said bring your own device was a regular occurrence, despite the fact that only 52% of organisations officially allow it.

Where policies forbid it, 78% of employees do it regardless.

This lack of oversight has left companies potentially vulnerable. Microsoft data shows that more than 90% of ransomware incidents begin with an unmanaged device.

Ivanti’s research agrees with this, with 38% of IT professionals admitting they do not have sufficient data about devices on their networks.

Edge devices, from smart cameras to remote sensors, further add to the exposure.

According to the report, around 40% of such devices remain unmanaged.

“To secure corporate networks against edge device vulnerabilities, organisations must keep edge devices upgraded to the latest release and push security validation to the user endpoint,” said Mike Riemer, SVP, Network Security Group and Field CISO at Ivanti.

Zero trust models are also falling behind adoption expectations.

79% of IT professionals say access controls are more important when staff work remotely, but only 34% of companies use zero trust network access and just 30% use privileged access management.

Daniel Spicer, CSO at Ivanti, said, “IT and security leaders should focus on taking inventory of all IT assets and bringing them under management. This means ensuring you can discover all existing devices, enforcing a clear BYOD policy and making sure that BYOD policy includes the ability to manage a device that wasn’t procured by the company itself.”

The report concludes that traditional perimeters are no longer effective and that companies need to extend management to all devices, wherever they are, and make use of identity-based access controls.

Source

Image Credit

Ahmed Kabir via Vecteezy

The latest updates straight to your inbox

We just need a few details to get you subscribed

Health Checks

Inventory & Compliance

Cloud Readiness & Optimisation

Agreement & Audit Support

Learning

Looking for something specific?

Let's see what we can find - just type in what you're after

Wait! Before you go

Have you signed up to our newsletter yet?

It’s chock full of useful advice, exclusive events and interesting articles. Don’t miss out!

Cookie Notice

Our website uses cookies to ensure you have the best experience while you're here.