WEB & TECH / JUN. 23, 2014
version 6, draft 6

Preventing Data Leakage From Mobile Devices

As more and more companies move their data to the Cloud the dangers lurking around file sharing when using mobile devices are increased. A company’s sensitive data and files are moved daily beyond the traditional IT control when using mobile devices to share or work on projects. The implication of this fact is huge. If file sharing services were accessed only from within a company’s controlled network, then there wouldn’t be a problem. However, in the real world dozens of tasks are executed in uncontrolled environments and on mobile devices. So, every time a sensitive file is transferred to a mobile device, it's at risk of leaking to third parties, whether maliciously or inadvertently.

The time has come for IT to rethink their data control strategy. IT must find a way to ensure that all the data from their company is secured and controlled. There is no stopping employees from using cloud based apps. Actually, employee mobility increases productivity. There is no question that cloud-based mobile file sharing is here to stay. You just need to take precautions and find solutions to data leakage. There are a few things to keep in mind when building your IT data control strategy.

  • IT must be able to see at all times what employees are doing with the company’s data accessed via the cloud, including audit logs that clearly show activity and can be used for reports.
  • IT must be required to ensure that the company’s data is secure, with no possibility of leakage, whenever data is accessed beyond the traditional corporate network.
  • Users must be able to work with corporate data on any native or market app, but it’s imperative to make sure that the company’s data is always encrypted.

It is necessary for users to be able to access securely the cloud-based company’s data from on the go in order to provide better customer service and obtain new business. IT must be able to guarantee the protection of the company’s data at all time. IT must be able to control and own key elements needed to establish security protocol, but at the same time users should retain the native mobile experience by being able to use standard browsers, viewers and editors.

There are a few software security solutions out in the market. It is a matter of researching the best solution for your company. Some file sharing solutions provide data security, but it forces the users to use limited or proprietary apps instead of the best apps available. This may lead to some frustration by the end user and can potentially reduce productivity levels in the company. Some IT people mistakenly believe that mobile device management (MDM) solutions offer the required data protection, but mobile device management is not the same or equal to data-level security. This is something that must be kept in mind at all times when implementing your data security solution.

We are living in a mobile society. There is no changing that fact. What is necessary is planning ahead and researching your mobile security when file sharing is involved outside the company’s security control. There are a few software solutions out in the market. It’s a matter of researching and finding the security solutions that best fits the needs of your company.

Get our FREE eBook!
'6 Steps to Landing Your Next Job'

LEAVE A COMMENT

0 comments

 

RELATED ARTICLES

Get our FREE eBook!
'6 Steps to Landing Your Next Job'


G up arrow
</script> </script>