Generic
Mobile Data Protection today: ease of use and security go hand in hand
23/02/2017 | Written by: Erno Doorenspleet
Categorized: Generic
Share this post:
Companies have embraced Bring Your Own Device (BYOD), without realizing it. Employees use their personal devices for business use and vice versa. An invitation for a drink with friends arrives amid management presentations or policy documents. The business world is gradually coming to realize that BYOD brings with it some pertinent security issues. Most multinationals currently have an app store in which employees can download applications. These may be agenda and mail applications or apps that employees can utilize to perform specific business tasks. The advantage of such an app store is that companies that have strong security solutions maintain control over their data and develop their own security policies. Suppose that hackers infect a smartphone with malware; a company can then mask or block data.
However, not every enterprise currently has a sound mobile security policy. This concerns me. We are long past the stage where malware on mobile devices is still in its infancy. Without a sound policy, professional cyber criminals can steal or infect confidential company data with just a few clicks. Of course, not every company has the same types of tools multinationals employ to protect their data. Still, there are solutions.
The initial step is free. Inform employees of the risks associated with mobile company data. A second step is to integrate mobile device management into your operational management. In the past, ease of use frequently suffered because of countless security measures. But that time has long passed. Today it is possible to enable employees to install business apps on their personal devices, without sensitive data ending up on the street. Employees can quickly install apps within a secured environment that is linked to the existing IT infrastructure, while the party responsible for your IT has an overview of and control over the various mobile devices in the network. He or she can intervene if company data becomes infected with malware. Today, ease of use and security go hand in hand.
Read here what can be done to combat mobile threats.
Global Executive Security Advisor, IBM Security X-Force Command
Automate work and accelerate business growth
Many companies need help to navigate the rapid changes that define today’s business environment. To improve their responsiveness and flexibility, they are looking for new ways of conducting business, rethinking their processes, and investing in digital transformation projects to increase the robustness of their operations. They rely on business automation technologies to cut out repetitive […]
Sustainability and the technologies enabling the transition
Creating a sustainable future demands significant technological innovation to decarbonize society, restore biodiversity and ecosystem health, foster thriving oceans for sustenance and economic growth, remove atmospheric carbon, transition to sustainable agriculture, and advance eco-friendly cities that align with our vision for a better future. Generative AI has achieved much in recent years and now surpasses […]
Technology in action at Think Summit 2021
Covid 19, the energy transition and climate change require business agility… right away! Organizations that are slowly starting their digital transformation are irrevocably overtaken by competitors: companies that can quickly realize new, sustainable business models with a remote workforce. How can organizations leverage innovations such as AI, machine learning and hybrid cloud to make […]