• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Is mobile affecting your IT business strategy?

June 4, 2013 by Secure360 and UMSA

mobile-strategyAttitudes about technology in the workplace are shifting. It used to be people would show up for a job and ask what devices they should use, what was supported. Now, employees show up with their own devices and expect multiple platforms and operating systems will all be supported.

Mobile is increasingly influencing mainstream IT.

Employees are bringing their own devices to work: smartphones, tablets, laptops. And, they are probably performing work functions on them, in the office or out, with or without your knowledge.

This might pose a security nightmare, trying to support and protect a wide variety of devices, or a security advantage; there is no one attack vector by which your organization will be taken down. However you view it, it’s not an issue that’s going away, and IT business strategy should include a plan for dealing with it.

Educate users

With the huge variety of devices and applications, controlling all of them would be very time consuming and not necessarily cost effective. Educating employees about how to use and not use their devices, empowering them to make informed decisions, is one way to help control security issues and make BYOD a success. Make sure users understand

  • How to onboard devices
  • Security policies
  • Data ownership policies
  • User responsibilities
  • How to get technical support

Educate employees about what constitutes private data and how to store and use it on personal devices. They may be storing client phone numbers on personal devices that could be lost or hacked without even realizing it’s a bad practice.

Making sure users know proper procedure won’t ensure that they’re always followed through on, but it will help reduce ignorance based breaches.

Security measures

Security is the biggest concern and measure of success when it comes to BYOD. Your employees should be educated, but, that said, you’ll still want to put security measures in place. A few  things to consider:

  • Create a list of approved devices both for your records and employee reference
  • Screen devices before they are allowed on the network
  • Protect devices that store data with a PIN AND a strong password
  • Encrypt data stored on devices
  • Pre-approve authentication and hardware security configurations on devices storing company data
  • Only allow connection to company network using an IPSec or SSL VPN connection
  • Create procedures to remove company data from devices used by  temporary staff or contractors
  • In case of lost or stolen devices, have a process for timely reporting of the loss and a plan to lock or wipe data as needed

Information technology is a key business function and it should be used in a way that allows the business to grow. Building mobile into your IT business strategy will help you reduce costs, increase productivity, and avoid security issues and gain competitive advantage by having the most up to date and diverse technology. Mobile is changing the way we live; it should be affecting your IT business strategy too.

Filed Under: Business Continuity Management, Cybersecurity, Professional Development, Risk and Compliance

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: As much as many of us enjoy it, there are risks to working from home, specifically as we rely more and more on the… https://t.co/S2nuIyWgjk
    about 58 minutes ago

  2. Secure360 Conference
    Secure360 Conference: The time to register is NOW, because today is the final day to score early bird rates. #Sec360 is the professional… https://t.co/rsIAkxmmCV
    about 1 day ago

  3. Secure360 Conference
    Secure360 Conference: We can never thank our wonderful #Sec360 sponsors enough! Silver Sponsors @AxoniusInc @BlackBerry @Fortinet and… https://t.co/pnYxfkR135
    about 1 day ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.