Lessons in mobile data loss protection for enterprise IT pros

With mobile devices everywhere in the enterprise now, learning tactics for data loss protection must become an IT priority.

Information Security Beyond the Page

Both corporate boards and those in charge of IT security are now conscious of risk that the influx of employees' smartphones, tablets and personal cloud services pose to sensitive enterprise data. Employee-owned Android and Apple devices are increasingly used to access and store sensitive data. As mobile devices become productivity tools, security professionals need to pay attention to data classification and mobile risk assessment. Failed attempts to safeguard enterprise data by banning mobile data access or locking down smartphones and tablets demonstrate a pressing need for more effective strategies against mobile security threats.

This Beyond the Page explores pitfalls to avoid and best practices that have proven effective. Learn about emerging technologies -- from containerized apps to context-aware policies -- that can help your enterprise stop costly mobile data leaks.

Feature

It's time to stop those mobile data leaks

The risks to enterprise security in this age of bring your own device is real but the corporation has been slow to implement effective measures for ensuring data loss protection. The enterprise InfoSec pro is in uncharted territory but as Lisa Phifer of Core Competence explains in this feature it's time to put corporate data protection front and center.

A recent Ponemon Institute survey of IT and security professionals found that 63% said their organizations have experienced mobile-related data breaches. Phifer reviews the top mobile security threats today and explores the strange disconnect between the threat and employees' perception of a security problem. Recognizing that there is a problem is the first step to ensuring data loss protection; the next is being up to date on the tools and strategies available. Read this feature to learn both the real scope of the problem and what can be done about it.

Video

Learn the latest strategies for stopping mobile data leaks

The use of mobile devices is growing exponentially and so are the risks to enterprise data these devices access. Attempts to secure that sensitive information, either by locking down smartphones and tablets or banning mobile access to corporate data, haven't worked. So what will?

In this video, Phifer reviews the most effective ways she's found to avoid mobile data leaks. She reviews best practices for mobile access to corporate data, and also explains how certain emerging technologies, like containerization, work. She also explores the world of context-aware security. Watch Phifer's presentation to get up-to-speed on the latest methods for ensuring mobile data protection.

Tech Tip

Per-app VPNs and other means to combat data loss

It's a tightrope walk, balancing mobility and security. With more and more employees relying on smartphones, tablets and laptops, talk of restricting use of personal mobile devices in the enterprise feels like a fantasy. Mobile devices have become central to many workers' daily business, so the focus must go to keeping the corporate data and networks they use secure. But threats are increasing and even Apple devices -- before rarely the object of hackers -- are no longer considered immune, not since malware was found in apps in the iTunes Store.

In this technical tip, Phifer looks at what InfoSec pros need to know to increase mobile security. She reviews why antimalware apps aren't always effective on a mobile device, considers blacklisting as a stop-loss measure, and explains why the per-app VPN is a tool to be seriously considered

Read the full November 2015 edition of Information Security magazine.

 

Next Steps

What does a mobile data breach cost enterprises?

Learn more about means for securing data on iOSes.

Discover more data protection products for mobile devices.

An introduction to products that manage and protect mobile devices

Dig Deeper on Network security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close