Dimension Data > Collaboration > 3 things to remember about security in the mobile age

3 things to remember about security in the mobile age

TwitterFacebookGoogle+LinkedIn

EUCDM_3 things to remember blog_cover_746x214_01

Jaco Hattingh Global Manager - End User Computing

Jaco Hattingh
Global Manager – End User Computing

 

In the world of business technology, mobile security is a major focus alongside energy efficiency and connectivity.

With the growth in mobile technology, and an increasing number of companies now supporting bring your own device (BYOD) programmes, increased concern over data security is on the move.

According to Dimension Data’s latest End-user Computing Insights, the average organisation is 30% more confident in their ability to deliver and manage devices than they were in 2013. This is due to vendors no longer delivering radically new features in their phones and tablets every few months as they once were.

However, the fact that the once clear boundary between work and play continues to blur means that security remains a major focus for organisations. Here are three pointers to bear in mind when embarking on a mobile security campaign:

EUCDM_3 things to remember button_700x80

 

1. You’re only as safe as your weakest link

The safety level of a corporate asset is equal to the strength of the weakest link that handles that asset. Because employees’ devices are handling confidential business data, they need to apply the required security enforcements per their company’s IT policies. With mobile workforces becoming commonplace in most industries, the need for holistic solutions and sound internal policies is paramount.

2. You’ve got to keep them separated

The mobile devices being used in your organisation’s BYOD programme must be configured such that sensitive business applications execute in a secure mode, separate from other irrelevant applications. Manufacturers like Intel have been including infrastructure for isolated execution into their products for some time now. The same consideration needs to be given to employees’ personal data, such as photos, videos, emails, etc.. These must be secured from access by any business applications.

3. BYOD vs CYOD

The freedom, efficiency, and cost savings of a BYOD policy are shadowed by a possible security breach from something as simple as a misplaced phone. That’s why many organisations are moving towards a choose your own device approach. CYOD offers more security and more control and is a much more frugal approach. It offers the same upside as BYOD, except employees get to choose from a list of devices the organisation supports. They may still buy and bring their own.

The real value of end-user computing initiatives, like working mobile, lies in applying them in innovative ways to achieve specific personal and business outcomes. This five-minute survey will help you assess your organisation’s readiness.

To learn more, take a look at Dimension Data’s latest End-User Computing Insights: a study of digital maturity report below.