23/02/2017 | Written by: Erno Doorenspleet
Categorized: Hybrid Cloud
Share this post:
Companies have embraced Bring Your Own Device (BYOD), without realizing it. Employees use their personal devices for business use and vice versa. An invitation for a drink with friends arrives amid management presentations or policy documents. The business world is gradually coming to realize that BYOD brings with it some pertinent security issues. Most multinationals currently have an app store in which employees can download applications. These may be agenda and mail applications or apps that employees can utilize to perform specific business tasks. The advantage of such an app store is that companies that have strong security solutions maintain control over their data and develop their own security policies. Suppose that hackers infect a smartphone with malware; a company can then mask or block data.
However, not every enterprise currently has a sound mobile security policy. This concerns me. We are long past the stage where malware on mobile devices is still in its infancy. Without a sound policy, professional cyber criminals can steal or infect confidential company data with just a few clicks. Of course, not every company has the same types of tools multinationals employ to protect their data. Still, there are solutions.
The initial step is free. Inform employees of the risks associated with mobile company data. A second step is to integrate mobile device management into your operational management. In the past, ease of use frequently suffered because of countless security measures. But that time has long passed. Today it is possible to enable employees to install business apps on their personal devices, without sensitive data ending up on the street. Employees can quickly install apps within a secured environment that is linked to the existing IT infrastructure, while the party responsible for your IT has an overview of and control over the various mobile devices in the network. He or she can intervene if company data becomes infected with malware. Today, ease of use and security go hand in hand.
Read here what can be done to combat mobile threats.