It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

BYOD Presents Major Data Security Concerns

Bring-your-own-device (BYOD) policies can provide substantial benefits to enterprises that utilize them, however they present a number of data security concerns as well. A recent study conducted by the Information Security Community group on LinkedIn found that many businesses struggle to balance the desire to facilitate mobility and enhance employee productivity with the need to adequately protect sensitive corporate information, ZDNet reported. 

According to the report, 75 percent of respondents confirmed harboring concerns over the risk of a data security vulnerability. An additional 65 percent said they worried about unauthorized users accessing company information. These concerns are not without merit. When employees are allowed to access company data with their personal devices, the security of sensitive information is dependent on whatever safeguarding measures are present on that device. Oftentimes, the cybersecurity of a personal device is minimal and presents a very real risk. 

ZDNet suggested that one of the areas of concern regarding BYOD security is encryption. The hallmark of a strong security procedure is the presence of encryption for both data at rest and in transit. Some policy makers assume one solution will cover both conditions, but this is not the case. By choosing one in lieu of the other, IT teams are putting their corporate information at risk. BYOD policies in particular require a comprehensive encryption plan. With information being passed from internal servers to employee mobile devices, businesses need to be sure that their data is encrypted at every level. In order to do so, enterprises need to utilize data encryption software, providing security for sensitive information not only as it is stored on company hard drives and personal mobile devices but while it is in-transit as well. 

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Wednesday, 02 October 2013