10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure-9 Next

Reconsider data access criteria

"The industry spends a lot of time worrying about whether user credentials are valid but we risk losing sight of the actual machines and code handling our data. The number of applications and devices handling enterprise data will only increase inside an organization, particularly with the Internet of Things reaching into enterprises," says Sean Ginevan, senior director of Strategy at MobileIron. "The user-centric authentication model doesn't solve emerging security issues. For example, if your CEO authenticates into a bad app, your data is lost. If your VP of Marketing connects their new smart fridge to the enterprise and there’s a vulnerability, it exploits the corporate network." Instead, organizations need to abandon the outdated blacklist model and decide what criteria they want met for data access. And then constantly reinforce that criteria.

After recent reports that a Secret Service agent’s laptop was stolen from a vehicle, new questions arose about the security of mobile devices. In the case of the Secret Service laptop, those questions involved national security and the well-being of the First Family.

Although your company’s data probably doesn’t include details about how to protect a president, that information is still very important for the operations and financial well-being of your business. The disappearance of the laptop should have had you questioning the security of any mobile device that has direct access to your organization’s sensitive data. That includes corporate owned and operated devices, as well as BYOD. Not sure what that security should look like? Security professionals share their tips for securing mobile devices and their favorite security solutions.

 
 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

bots How Bots Are Going to Work to Increase Efficiency

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting. ...  More >>

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.