Tips for Securing Data in a Mobile World

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Tips for Securing Data in a Mobile World-7 Next

Encryption

Data protection should exist in two measurable tiers: access and usage.

Quite simply, the best way to protect sensitive information is to have it encrypted. While there are different types of encryption that encrypt data based on its location (on the drive, in transit on the network, etc.), experts today agree that it's best to simply encrypt the information itself. That way it's protected no matter where it ends up. If it's on a laptop drive, it's encrypted. If it's in transit across the network, it's encrypted. If it's in a file-sharing site such as DropBox, it's encrypted. If it's on a USB key hanging around someone's neck, it's encrypted. Ultimately, the information is persistently secure … regardless of whether it in inside or outside of your network boundaries.

Today, most of the sensitive and confidential information that a business has – executive communications, orders, reports and strategies – resides on computers and is often shared and accessed via email. An escalating amount of that email is also handled on BYOD devices, which travel with employees wherever they go. While information security teams understand the magnitude of the mobile threat, they are often not exactly sure how to secure information and data that is constantly on the move.

In the last few years, three different security scenarios have emerged – BYOD device flexibility, working outside the office, and the increasing threat of cyber security breaches. Together, they have formed a security threat most IT security teams simply are not able to comprehensively address.

Given the fluid nature of BYOD and related security issues, the next logical step is to approach the data's security independent of the device or location. The best minds in security are now paying attention to the vulnerability (or lack thereof) of the data itself, and less to the device on which it resides. If the data is secure wherever it goes, then where it resides becomes unimportant. 

This slideshow features important IT security points to consider for 2015 and beyond from Watchful Software.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.