Mobile security

Keeping track of devices and securing them is vital. Here's how to achieve it

As more mobile devices become part of organisations’ IT infrastructures, how can IT keep control of devices, data and applications while giving users the freedoms they need to work in the modern world?

The reality is that a full enterprise mobility strategy is essential to ensure security, maximise staff productivity and minimise risk. 

With such a choice of devices on the market, there is no shortage of choice available. Deciding on your devices will depend to some extent on the applications you use, and whether you work on iOS or Android. Different departments and even users may prefer Mac or Windows, so you may also need to factor that in. Lastly, decide on your policies for Bring your Own Device (BYOD) to have a formal structure in place for supplementary devices. You will also need to have a plan for protecting data on BYOD devices.

With BYOD policies, clearly it’s the user that owns the device – or is it? Regardless of the device, you’ll need to be clear on security procedures for devices, especially if they are running applications or holding any sensitive customer data.

Other policies such as Choose your Own Device (CYOD) can empower employees but reduce the risk that can be associated with BOYD. CYOD also makes it clear to staff of their responsibilities and the need to be responsible with applications and data.

Whichever policy you choose, ensure it is clearly communicated to your staff. Simply sending a long email to all staff isn’t likely to be adequate, so an internal communications campaign with posters and even a short explainer video could be considered.

Either way, it’s vital to lay out to your staff who is responsible for what, regulations that must be followed, consequences of non-compliance, and any outcomes for staff that don’t abide by the policy. This should include guidance on safe and unsafe WiFi networks to connect to, and the hidden risks of carrying out sensitive tasks or banking on public WiFi networks.

Whatever strategy you choose, it’s essential to have an understanding of how you will manage your mobile business. With BYOD or other policies, it can quickly become difficult to keep track of what devices are running, what applications are resident on each, and a robust plan for updating applications. Failure to do so can mean essential security patches are missed, meaning loopholes for cybercriminals to exploit. Learn more about mobile security in these pages of The Cloud Community.

Reseller Spotlight
Ubertas Consulting
Ubertas Consulting
Learn More
Paradise Computing
Paradise Computing
Learn More
Cloudthing
Cloudthing
Learn More
ZEN Internet
ZEN Internet
Learn More
WWCS
WWCS
Learn More
Strategic Blue
Strategic Blue
Learn More
Stripe OLT
Stripe OLT
Learn More
Related Stories

Share this story