Hybrid Cloud

Mobile Data Protection today: ease of use and security go hand in hand

Share this post:

Companies have embraced Bring Your Own Device (BYOD), without realizing it. Employees use their personal devices for business use and vice versa. An invitation for a drink with friends arrives amid management presentations or policy documents. The business world is gradually coming to realize that BYOD brings with it some pertinent security issues. Most multinationals currently have an app store in which employees can download applications. These may be agenda and mail applications or apps that employees can utilize to perform specific business tasks. The advantage of such an app store is that companies that have strong security solutions maintain control over their data and develop their own security policies. Suppose that hackers infect a smartphone with malware; a company can then mask or block data.

However, not every enterprise currently has a sound mobile security policy. This concerns me. We are long past the stage where malware on mobile devices is still in its infancy. Without a sound policy, professional cyber criminals can steal or infect confidential company data with just a few clicks. Of course, not every company has the same types of tools multinationals employ to protect their data. Still, there are solutions.

The initial step is free. Inform employees of the risks associated with mobile company data. A second step is to integrate mobile device management into your operational management. In the past, ease of use frequently suffered because of countless security measures. But that time has long passed. Today it is possible to enable employees to install business apps on their personal devices, without sensitive data ending up on the street. Employees can quickly install apps within a secured environment that is linked to the existing IT infrastructure, while the party responsible for your IT has an overview of and control over the various mobile devices in the network. He or she can intervene if company data becomes infected with malware. Today, ease of use and security go hand in hand.

Read here what can be done to combat mobile threats.

Global Executive Security Advisor, IBM Security X-Force Command

More Hybrid Cloud stories

Connect every link with Supply Chain automation

Intelligent automation allows manufacturers and retailers to optimise their supply chains relatively easily and quickly, without relinquishing control. However, 69 percent of logistics organisations have not yet fully integrated their supply chains. What logistical challenges do retailers and manufacturers face and how do they solve them? From the supply of raw materials to the final […]

Continue reading

Tim Pauwels over zijn weg naar Wimbledon 2019

Mijn weg naar Wimbledon werd werkelijkheid met mijn selectie om als lijnrechter te arbitreren op de 2019 kwalificaties. Dit kwam volledig onverwacht. Heel veel arbiters willen dit graag bijwonen. Dat ik, als Belg, gekozen werd om in dit schaakspel een pion te spelen was een fantastische ervaring. Het geeft je ook de kans om alles […]

Continue reading

Heineken lays foundation for data-driven strategy with IBM

Central BI-platform in the cloud for cross-business insights Data is the new gold. Particularly for a multinational company such as Heineken that has to take into account both regional and international economic aspects and consumer preferences. To be able to take well-considered decisions in the future based on internal and external data, Heineken wants to […]

Continue reading