It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Taking on Mobile Security

Bring-your-own-device (BYOD) policies are quickly gaining popularity with enterprises across the world. The potential for reducing hardware costs and increase productivity by allowing employees to handle company business on their own devices has driven this trend. Cisco's "BYOD: A Global Presence" study reported that 89 percent of IT departments across the globe are currently using BYOD in some form. However, adopting a BYOD policy brings with it a host of additional challenges for IT teams who must contend with new network vulnerabilities.

The high cost of mobile breaches
When companies allow employees to access company networks and data with personal devices, they are opening themselves up to whatever security weaknesses are present on those machines. The cost of these security lapses can be significant. ZDNet reported that a study on mobile computing found that the average annual cost of mobile security breaches is $429,000 for each business. That figure includes data and productivity loss, brand damage and an erosion of customer trust. Additionally, the annual cost for small businesses was $126,000, a hefty sum of money for enterprises that must keep a constant watch on their bottom line.

There are different methods to defend a company's BYOD network from intrusion. One way is to secure employee's mobile devices. TechTarget recommended that businesses take the initiative and require strong password protection and anti-malware practices to protect an employee's hardware. In addition, the source suggested that IT teams implement management software that would allow them to monitor mobile device activity and remotely install or remove applications.

Protect data, not devices
BizTech2 argued, however, that a strong BYOD security plan focuses on securing data and less on devices. At this point in time, data breaches are a near inevitability. That is why it is absolutely essential that IT teams take steps to protect sensitive information in the event that hackers gain access to their network. Encryption techniques can be utilized to prevent cybercriminals from accessing critical files. The main concerns with BYOD policies are that employees' personal devices can either be lost, stolen or hacked. But if the sensitive files stored on their smartphones and tablets are encrypted, cyberthieves will not be able to extract any meaningful information from them.

With the BYOD trend showing no signs of abating, companies need to think long and hard about the security of their networks. Although IT teams should improve the defenses of employee mobile devices whenever possible, data security should always be a priority. Data encryption software can secure critical and sensitive information in the event of a network breach, allowing businesses to enjoy the benefits of BYOD while mitigating some of the risks.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Wednesday, 02 October 2013