dcsimg

10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

  • 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

    10 Steps Your Organization Should Take to Keep Mobile Device Data Secure-

    Remote wipe software

    Verizon’s 2017 Data Breach Digest has a number of suggestions regarding better protection of mobile devices and data, but perhaps the most important suggestion is this: "Enable Remote Wipe – Most mobile devices support this functionality meaning that if your device is misplaced, you’ll be able to delete all data using this feature. To use this feature, the administrator setting on the device must be enabled, and it’s important to ensure that a backup has been performed prior to protect against loss of user data." There are conflicting messages regarding the Secret Service’s ability to remote wipe its laptop, but if it was able to, there would be fewer concerns about what the thieves could access.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
  • 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure-6

    Remote wipe software

    Verizon’s 2017 Data Breach Digest has a number of suggestions regarding better protection of mobile devices and data, but perhaps the most important suggestion is this: "Enable Remote Wipe – Most mobile devices support this functionality meaning that if your device is misplaced, you’ll be able to delete all data using this feature. To use this feature, the administrator setting on the device must be enabled, and it’s important to ensure that a backup has been performed prior to protect against loss of user data." There are conflicting messages regarding the Secret Service’s ability to remote wipe its laptop, but if it was able to, there would be fewer concerns about what the thieves could access.

After recent reports that a Secret Service agent’s laptop was stolen from a vehicle, new questions arose about the security of mobile devices. In the case of the Secret Service laptop, those questions involved national security and the well-being of the First Family.

Although your company’s data probably doesn’t include details about how to protect a president, that information is still very important for the operations and financial well-being of your business. The disappearance of the laptop should have had you questioning the security of any mobile device that has direct access to your organization’s sensitive data. That includes corporate owned and operated devices, as well as BYOD. Not sure what that security should look like? Security professionals share their tips for securing mobile devices and their favorite security solutions.