Subscribe       Feed   All Posts     Search by Topic:
       

What’s Your Mobile Security Grade?

Blog Image: 

Be honest. How would you rate your mobile security: poor, adequate or excellent? If you answered “excellent” then consider yourself among the elite. Only five percent of organizations we surveyed (in conjunction with ISMG) rated their security policies as such, compared to 75 percent who believe their processes are either “poor,” or “need improvement.”

That means, that for the majority of organizations, there’s tremendous progress yet to be made.  Mobile malware is proving to be relentless, growing at a startling rate of 614 percent from 2012 to 2013. Add to that the fact that more than half of mobile devices (53 percent) are now storing confidential business data and it’s easy to understand why you should do everything within your power to prevent a mobile breach.

To that end, we’ve outlined 14 steps to help you better secure your mobile workforce. You likely already have some pieces in place, but it’s the gaps that can leave your company and your users vulnerable. In order to breach-proof devices under your management, a comprehensive security solution is required – one that offers seamless productivity and access for end users, but also 24x7 administrative controls and monitoring.

For example, a best practice is to create a “walled garden” for business data, storing information in a secure container separate from consumer apps and personal documents. This makes it easy for IT to monitor enterprise information while respecting the privacy rights of employees using their own devices for work. 

Another is remote wiping, which gives administrators the ability to delete business data and apps on a mobile device that’s lost, stolen or in the possession of someone who has left the organization. For example, if Joe Smith has left the company, an IT administrator should be able to delete his files on all the mobile devices currently storing them, including mobile devices belonging to his co-workers as well as devices not configured with Mobile Device Management (MDM) software.

That’s just a few of the 14 steps the companies should review and implement to truly secure their business content on mobile devices. To dive into the complete list and find out how your organization stacks up, download our new whitepaper on “Mobile Data Security: 14 Steps to Securing Your Mobile Workforce” now.

See All Blog Posts >>