• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Sitemap
  • About
    • Contact

Business Security Information

Helping You Protect Your Business

  • Physical Security
  • Computer Security
  • Fraud
  • General Security
  • Reviews
You are here: Home / Computer Security / How to Manage Information Security in a Mobile Workplace

How to Manage Information Security in a Mobile Workplace

February 1, 2013 By Sean Leave a Comment

Laptop Mobile PhoneThe penetration of mobile technology across a variety of industries has surpassed even the wildest expectations.  According to Gartner, 80% of businesses will support a workforce using tablets in today’s business environment. Smart phones, tablets, and mobile devices are highly appreciated for their flexibility in data input, portability, and ever-present connectivity. These characteristics have basically changed how, where, and when work is done, completely redefining the traditional workplace.

The skyrocketing use of mobile devices among employees has also ushered in new and extraordinary threats to information security. As a result, those organizations that have preventative measures against these risks can enhance employee efficiency and secure a competitive advantage. Within this context, information security refers to protecting both the data storage and data transmission whether it refers to personally identifiable information of employees and customers, corporate data or intellectual property.

Complicating Factors For Information Security

There are many factors that have influenced the implementation of effective information security strategies and policies within an organization. Some of these factors include:

  • Diversity of mobile devices as far as divergent operating systems.
  • Multiplication of mobile devices and, consequently, difficulty in controlling hardware.
  • Use of familiar devices by the employees instead of those offered by the company.
  • Frequently upgraded devices to keep up with technology.
  • Increase in social networking among employees on their mobile devices.
  • Ubiquity of cloud computing.

Security Threats To Mobile Devices

As the number and types of mobile devices increase, so do the attempts to exploit them. Consequently, cyber criminals tend to target mobile devices more than ever before and, unfortunately, with increased efficiency. G Data Security Labs reveals that malware targeting of smart phones and tablets rose by 273% compared to 2011.

Managing Security In A Mobile Workplace

It is true that mobile devices bring substantial hurdles to enterprises. However, these hurdles are not insurmountable, and businesses can still transform information technology to minimize risks for data, networks, and applications while taking advantage of mobility through new governance, support processes, and outstanding IT skills. In order to manage information security in a mobile workplace, businesses should:

  • Start by understanding exposure of regulated data, including trade secrets, industrial designs, and patents;
  • Be aware of the unique risks that define each business and build a security framework on a platform that caters to those risks;
  • Explore how and when employees use technology on and off the job to establish the most appropriate security measures;
  • Determine a set of mobile devices that can access the network and prevent the addition of new mobile devices by the employees;
  • Create preventive controls to ensure that unproved units cannot access the network;
  • Establish the type of corporate information that approved devices can store and also the type of data that can be exchanged between the approved device and the corporate network;
  • Determine encryption and authentication security measures to protect data on approved units;
  • Establish measures that allow the distinction between corporate and personal information;
  • Establish where corporate data is allowed to reside (device, network, cloud, or a combination);
  • Assess application and services to determine potential risks so that only approved users can access the network;
  • Ensure that cloud and data service providers meet the security requirements;
  • Implement mechanisms to enforce the controls and standards.

When a business has finished implementing the proper security strategies and policies, employees need to be made aware and trained in best practices for secure use of mobile devices. Since most technical issues can be overcome through training and knowledge, employee awareness is often the weakest link of mobile security. Employee compliance becomes a crucial element of a successfully implemented security strategy for mobile devices.

About the author: George Hillston is professional freelance writer and passionate information security blogger. To ensure complete security with your business’s confidential information, he recommends Shred-It for all your data destruction needs.

Filed Under: Computer Security Tagged With: Business Security, Data Security, Information Security, Mobile Phone Security, Security Issues, Security Solutions, small business security

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

My Profile

Sean McCreary, CPP, CISSP, CCSP, ARM is both a physical security and a cybersecurity professional. He has over 35 years experience in the security field. Sean is a CPP (Certified Protection Professional), CISSP (Certified Information Systems Security Professional), and a CCSP (Certified Cloud Security Professional) along with holding a variety of other vendor certifications. Beyond his experience he also has degrees in Loss Prevention and Safety, Information System Security, Security and Loss Prevention and Police Science. In addition, he is a weapons, self-defense and Hapkido instructor. Read More…

Security Links

  • CSO Online
  • Kevin's Security Scrapbook
  • Krebs On Security Blog
  • The Disaster Recovery Guide

Security Resources

  • CrimeMapping
  • CrimeReports
  • PCI Info for SMB
  • RXPatrol
  • SpotCrime

© Copyright 2018 Business Security Information · All Rights Reserved · Privacy Policy · Terms of Use · Disclosure · Site-Map · Website Design By Ironclad Tech Services