Eight Steps to Enterprise Data Protection
Eight steps to developing an enterprise data security plan.
As an IT Manager (and probable gadget-lover), you know how convenient mobile devices are for getting work done while on the go. At the same time, you are also acutely aware of the risks of having company data stored on and retrieved by devices on unmanaged networks. That potential vulnerability makes creating an acceptable-use policy a wise move. This way, mobile users know exactly what is and isn't permitted on the corporate network, whether from a smartphone, laptop, tablet or PDA, and what measures need to be taken before attempting to connect using these devices. In turn, the IT department knows who plans to connect with what device so it can put appropriate security measures in place.
Info-Tech's "Mobile Device Acceptable Use Policy Template" helps you clearly communicate your organization's rules when it comes to using any mobile device to access corporate information via an unsecured network, whether the device is personally owned or supplied by the company. The template includes requirements for registering mobile devices with IT, installing a personal firewall, reporting lost or stolen devices and getting support. The goal is to prevent security breaches that "could result in loss of information, damage to critical applications, loss of revenue and damage to the company's public image."
Workers are going to use (or try to use) these devices for legitimate business purposes, often outside of direct IT control. Avoid the accompanying risks with a clear, comprehensive policy.