Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: 5 steps to protect your business data in a mobile world
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > 5 steps to protect your business data in a mobile world
Best PracticesSecurity

5 steps to protect your business data in a mobile world

mrcuser
mrcuser
12 Min Read
SHARE

The rise of mobile presents many advantages to the modern business. As mentioned in this article, mobility can improve customer service, retention, internal productivity, and much more.

Contents
1. Educate, Educate, Educate2. Implement BYOD policies3. Treat the device as a portal4. Define what data needs to be protected5. Use best security practices in developmentSummary

The rise of mobile presents many advantages to the modern business. As mentioned in this article, mobility can improve customer service, retention, internal productivity, and much more.

But, these advantages come at a cost. The rise of employee-owned mobile devices in the workplace brings new security challenges. Protecting sensitive business data becomes more difficult than ever.

More Read

Are Security Pros Becoming Too Paranoid?
4 Guidelines for Protecting Your Data with Cloud Backup Software
How a HIPAA Breach Can Negatively Impact Your Business
4 HUGE Misconceptions About Business IT Security
Big Data Is Fundamentally Altering the Future of File Transfer Security

How much is mobile impacting security? A new study finds that employee’s mobile devices are increasingly the cause of data breaches. In fact, over two-thirds of IT and IT security professionals in the study claim that their organization likely had a data breach as a result of employees accessing company data from their mobile device.

So, what can you do about this? Can you ban employee-owned mobile devices? Of course not. Mobile is the new reality for businesses. Most businesses can’t possibly stop employees from bringing their own devices into the workplace.

So, how can you protect your sensitive data in this new, mobile world? Of course, one option involves providing your employees with company-owned devices. If you take this route, you can set up Mobile Device Management (MDM) tools, and control the devices.

But, this still doesn’t ensure that employees aren’t also using their own mobile devices in the workplace. The question is…how can you protect your mobile data across devices that you can’t control?

Today, let’s explore this question. Here are 5 steps you must take to protect your business data in a mobile world:


1. Educate, Educate, Educate

photo credit: jarmoluk via pixabay cc

If we’ve learned anything from recent data breaches, it’s this: Users have awful security habits. How bad are they? To illustrate, I’ve tracked down the list of the 25 most popular passwords from 2015, and have listed just the top 3 below:

  1. 123456
  2. Password
  3. 12345678

That’s right. People actually use these passwords to protect their accounts, data, social media profiles, email, etc…

Do you really want to assume that users know how to securely use their phones, or protect the data on their devices? Do you think they’ll know to avoid public wifi, phishing emails, malware, or any of the many threats to mobile security?

The first step in keeping your data secure in the mobile age is education. Your employees must understand best security practices for their mobile devices. We won’t get into all of them here, but if you want to read more, we’ve outlined 14 security tips for mobile users, in this two-part article (part 1, part 2).


2. Implement BYOD policies

It’s the new mobile reality. Employees will bring their own devices into the workplace. They will use those devices for work-related tasks–often without the company’s knowledge.

Most of the time, employees aren’t trying to do anything malicious. They’re just trying to get their job done. The problem is, when employees don’t understand what they can (and cannot) do with their personal devices, you put your data at risk.

What should you do? As explained below, creating clear BYOD policies is one of the first steps you should take. If you want to avoid accidental security breaches, employees must understand the rules and restrictions of personal devices.

“Companies can combat these threats by having BYOD (Bring Your Own Device) policies and Acceptable Use policies for personal assets,” says Christopher Roach, Managing Director and National IT Practice Leader of CBIZ Risk & Advisory. “This could include the use of application software loaded onto these mobile devices that encrypts data and requires additional measures in order to access company information on the device. The key to protection is two-fold – both technology and training must be utilized in order to provide the best protection for the company. The company should have the ability to “wipe” the mobile asset remotely if it is loss or stolen, thus reducing or eliminating the risk to the company.”

What makes a good BYOD policy? As explained above, BYOD policies include both technology and training. We won’t get into every aspect in this article, but it’s a topic I’ve covered in a previous article, which you can find here. Additionally, if you’d like to learn more about technology to help you manage BYOD, here’s a roundup of solutions over on PCMAG.com.


3. Treat the device as a portal

photo credit: BenjaminNelan via pixabay cc

What’s easier: Trying to control data that’s spread across an unknown number of devices, or trying to control data stored in one place? Obviously, controlling a single location is the simplest option.

Yet, so many businesses attempt the first approach. Employees store data on their devices, and the business tries to monitor and control each one.

The better solution: Store data securely in your database, and make it accessible via mobile web applications. Why? This gives employees access to the data they need, without storing it on the device itself. As explained below, treating the device as a portal (and not a destination) is one of the best ways to protect your data.

“The best way to protect data on a mobile device is to not have any data on it in the first place,” says Brian Allison, Senior Account Executive at Innovative Network Computer Solutions. “As we’ve seen from some of the recent activity with the San Bernardino iPhone and even more recent activity by the LAPD, devices can be hacked and without the manufacturer’s assistance. The assumption needs to be that data outside the four walls of the enterprise is subject to compromise (and yes, inside the four walls it can still be compromised, but the defenses can be better controlled there).

Instead, the mobile device, whether tablet or phone, should only be used as a portal to view information. It’s possible to have full rights to the data being viewed, to not only read it but to also make changes to it, but the data itself stays on the server, wherever that may be located. That way, if the device is lost or stolen, it can be shut off in terms of network access at a moment’s notice to make sure the data remains protected.”


4. Define what data needs to be protected

Now, if you treat the device as a portal, should you make all of your data available to mobile users? Not at all. One the biggest data security mistakes is making too much data available on mobile devices.

Just because you can make it mobile accessible, doesn’t mean you should. The fact is, much of your data should not be accessible on mobile devices. Why? Maybe it’s sensitive data, or maybe making it accessible via mobile devices offers little value.

For instance, your salespeople might need product and customer location data available on their smartphones. But, do you need sensitive HR data available outside of the office? Not only is it sensitive data, but offering access via mobile devices provides little value. It’s a high-risk, low-reward option. As explained below, understanding which data needs the most protection is one of the most important steps you can take.

“Define what needs to be protected,” says Ali Solehdin, Product Expert at Absolute. “Data is a big bucket for most organizations and attempting to protect everything is an expensive and unrealistic approach. For a first step you should determine what data is important and sensitive, where it is located, and who is authorized to access it. Run data audits across all mobile endpoints to determine what data is stored on these devices and align it with the end user to verify that access is warranted.

These initial steps will define the scope of the work and allow you to focus your planning and resources only on data that requires a higher level of security. Once this initial work is complete, you can create a mobile data strategy that supports your specific requirements.”


5. Use best security practices in development

photo credit: pixelcreatures via pixabay cc

Now, I realize that this point may seem obvious. After all, don’t businesses already understand the importance of using best security practices in their development? If they’re building web or native applications for use on mobile devices, they certainly would follow best security procedures…right?

Surprisingly, it seems the answer is “No.” Or, if businesses do understand the importance of security, it’s being largely ignored.

As mentioned in this article, 86% of applications have serious security issues. What’s worse, over half of applications contain commonly-known vulnerabilities, like Cross-site scripting, SQL Injection, and more. These are threats that businesses have known about for over a decade–yet willingly ignore.

Why does this happen? As explained in the article, much of it boils down to priorities. For many businesses, security takes a backseat to development speed. As developers rush to meet deadlines, security often gets glossed over.

However, with the added security risks of mobile, businesses cannot afford to ignore security in the mobile development. As explained below, you must follow security standards in any mobile development project.

“Anyone developing mobile applications should utilize industry accepted security standards and best practices to reduce the risk of compromise,” says Kristen Peed, director of corporate risk management at CBIZ. “For example, minimum standards should be developed (and trained on) the PCI Mobile Payment Acceptance Security Guidelines, OWASP Mobile Top Ten vulnerabilities and mitigation practices, and incorporate application vulnerability assessment and code review throughout the development process and routinely after deployment.”

Summary

These are just 5 mobile security tips for business, but the list could certainly be much longer. If you would like to add anything to this list, I’d love to hear it. Feel free to share in the comments.

Share This Article
Facebook Pinterest LinkedIn
Share
Bymrcuser
Follow:
Joe Stangarone is a 30+ year veteran of the IT industry and president of mrc—the software company behind the award winning development platform, m-Power. Joe shares his leadership and technology insights through the Cup of Joe Blog, focusing primarily on ways businesses can save time, money, and increase productivity using technology.

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

self driving vehicles
Best PracticesBig DataData CollectionExclusive

Your Guide To Different Telematics Solutions And The Data They Collect

6 Min Read

Managing Big Data? Make Sure You Know the Challenges

15 Min Read

Big Data, Big Mistakes?

7 Min Read
Ransomware attack
Security

AI-Driven Ransomware is a Terrifying Threat to Businesses

10 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?