Mobile Device Management and Encryption

Mobile Device Management and Encryption

What it is and why you need it NOW… by numbers.

Here are some simple facts of life about the use of IT in modern businesses.

  1. People are using more devices of different kinds to work on. We used to use PCs and we now use PCs, laptops, tablets and smartphones.
  2. Many of those devices are getting smaller.
  3. Many of the devices are owned by the user NOT by the business.
  4. Most users are loading non-business applications onto devices used for work.

This means that your company data may be sitting on a device which poses a very significant security risk. While the loss of a laptop, tablet or phone can be expensive, it is the loss of data which can really hurt.

You could suffer a major data breach if:

  1. Your employee leaves your company with your data on his or her personal device.
  2. Your employee loses a device or has it stolen.
  3. A non-business application is hacked or contains malware causing a data breach.
  4. An employee (or someone using their device… such as teenage kids) uses the mobile device to visit dangerous websites.

And now for some scary numbers:

  1. According to the National Crime Survey, over 400,000 mobile phones were reported as stolen in the UK during the year to March 2017. This does not include phones which were lost.
  2. Data released in America by the FBI suggests that over 7% of all business laptops will be lost or stolen.
  3. According to a recent survey by the Ponemon Institute, 59% of employees who are sacked or quit their employment will take company data with them. This includes malicious action, theft, sabotage and simple carelessness.
  4. Under the provisions of the General Data Protection Regulation (GDPR), serious data breaches can result in huge financial penalties. The maximum fine for a serious data breach can be up to 20 million Euros or up to 4% of your worldwide business turnover if this is larger.

So how do we reduce the risks?

  1. The first step is always to implement solid IT usage policies and ensure that users are educated and continually reminded to comply with them. We can help with that!
  2. Ensure that all devices are using the latest version of their operating system with any security patches installed. Make sure that all applications are up to date and have any anti-virus / anti-malware software installed.
  3. Use encryption software on all mobile devices when possible. This ensures that if a device is stolen, lost or subject to unauthorised access, business data is unreadable.
  4. Use mobile device management software (MDM). This allows you to control what goes on any mobile device, preventing dangerous applications from being used. It also allows you to restrict the movement or export of your data. It can prevent the device accessing dangerous websites. MDM can also allow remote locking of a device or remote wiping of data. This means that any stolen device would be absolutely useless within minutes of being taken.

What are the key takeaway points?

  1. More of us are working on mobile devices.
  2. Mobile devices and the data they hold pose a high security risk.
  3. The penalties for losing data can be huge.
  4. You can fix this problem with our help.

If you’d like to discuss this issue with an expert adviser, call Active IT for honest, independent and highly professional advice.

Active IT.
We take care of IT so you can take care of business.
Mobile Device Management