• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Mobility   »   Improving data security during mobile device proliferation

Improving data security during mobile device proliferation

  • Posted on:May 31, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

Mobile devices are rapidly entering the business world and providing employees with a unique opportunity to enhance productivity and efficiency. However, these gadgets are also becoming common targets for malicious outsiders and hackers, as the tools are often less protected than traditional platforms that access corporate networks.

As a result, decision-makers need to implement strong data security practices that reduce vulnerabilities in the mobile environment. In the advent of BYOD (bring your own device), chief information officers should enforce the use of strong passwords that enable access to sensitive records, according to a Data Center Journal report. These logins should be complex, containing a variety of characters, without using any guessable dates, numeric patterns or phrases.

IT departments should also have the ability to remotely wipe any device with access to corporate resources that gets lost, stolen or compromised in some other way. Gadgets should also be automatically wiped after a certain number of failed attempts to log in to the device or network, Data Center Journal asserted. As a result, attackers will only have a limited number of opportunities to gain entry to mission-critical environments, reducing the chances of a data breach.

Encryption is an important part of data protection and should not be forgotten when mobile gadgets are introduced to the workplace. Many portable electronics have the ability to utilize encryption technologies without disrupting operations, forcing individuals to input the correct keys to access the sensitive data hidden within the cryptic architectures, Data Center Journal said.

According to a recent mobile security study by SANS, while 60 percent of organizations allow individuals to bring their own devices to work to perform business-related tasks, only 9 percent of IT departments are fully aware of all the tools accessing the network.

"The survey results proved what we have suspected all along – organizations are not prepared for the proliferation of mobile devices across the enterprise," Bradford Network chief marketing officer Tom Murphy said in response to the SANS survey. "Businesses need to balance the productivity gains of BYOD with the very real concerns around protecting sensitive data. This starts by gaining visibility into all the devices that are accessing the network."

Unobstructed visibility is imperative for companies to improve data privacy capabilities and eliminate the outsider's ability to gain entry to sensitive networks. This is especially important with the advent of mobile strategies and an increasing number of users accessing corporate resources in a variety of ways.

Consumerization News from SimplySecurity.com by Trend Micro

Related posts:

  1. Employee-owned mobile device necessitate more security
  2. Future of mobile security will be device-agnostic
  3. Why SMBs Need Mobile Device Security
  4. Prioritizing data over device in mobile security

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.