dcsimg

10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

  • 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure-

    Shred messages

    Galina Datskovsky, CEO of Vaporstream, suggests that mobile device users should take advantage of ephemeral technology for their mobile messaging services. Ephemeral messaging allows a user to send a message. When it is received and read by the recipient, the message disappears after a predetermined amount of time. This gives users the ability to ‘shred’ a conversation and remove it from a device in its entirety and, Datskovsky added, "as a result, even when attackers do infiltrate a device, they will not be able to extract private messages -- because they won’t be there."

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
  • 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure-5

    Shred messages

    Galina Datskovsky, CEO of Vaporstream, suggests that mobile device users should take advantage of ephemeral technology for their mobile messaging services. Ephemeral messaging allows a user to send a message. When it is received and read by the recipient, the message disappears after a predetermined amount of time. This gives users the ability to ‘shred’ a conversation and remove it from a device in its entirety and, Datskovsky added, "as a result, even when attackers do infiltrate a device, they will not be able to extract private messages -- because they won’t be there."

After recent reports that a Secret Service agent’s laptop was stolen from a vehicle, new questions arose about the security of mobile devices. In the case of the Secret Service laptop, those questions involved national security and the well-being of the First Family.

Although your company’s data probably doesn’t include details about how to protect a president, that information is still very important for the operations and financial well-being of your business. The disappearance of the laptop should have had you questioning the security of any mobile device that has direct access to your organization’s sensitive data. That includes corporate owned and operated devices, as well as BYOD. Not sure what that security should look like? Security professionals share their tips for securing mobile devices and their favorite security solutions.