The Biggest Threat To Your Company’s Data Security Is Your Employees

Mobile Data Theft

In today’s work culture of ‘always on, always accessible’, employees have expectations of seamless access to documents and files both on and off the company network and on mobiles or tablets, without concern for potential security issues.

According to a Cisco study, the average number of connected devices an employee will own for work is expected to be 3.5 by the end of 2014. The increasing popularity of mobile devices, as well as company-wide BYOD policies, offers businesses many opportunities but, if not managed carefully, also comes with great risks.

A study by EE found that in the UK alone nearly 10 million work devices were lost or stolen in 2013. This presents many challenges to managers wishing to maintain a work environment that is rich in features and accessibility yet one which is not detrimental to security.

With only 7% of stolen devices ever being recovered, the resulting potential for data leakage is huge. The majority of work-related electronic devices contain sensitive or confidential information, but how many of them can be traced or remote wiped in the event of loss or theft?

Without adequate protection in place, company data is vulnerable to exposure. However, research shows that only 14% of companies currently have a mobile device security policy in place. So what can be done to maintain an always accessible work environment through device proliferation whilst ensuring protection against data leakage?

A common approach to data management is to undertake the arduous and ultimately counter-productive task of trying to lock down the corporate network and mobile devices in order to limit and control employees’ use of the many cloud services available today. Whilst this often has a limited degree of success in ensuring that employees don’t use consumer cloud services on the corporate network, it is far from effective.

There are now services available that address data management and leakage issues whilst allowing IT administrators to provide company staff with user-friendly remote and mobile access and file sync and share functionality, giving them the ability to access and collaborate on their files from anywhere.

Managers should be considering these secure, scaleable services that enable the same level of access and productivity as their unsecure consumer-focussed counterparts without detrimentally impacting upon security.

These services eliminate risk through features such as remote data wipe. Once a device has been reported lost or stolen, IT staff can administer the device via a cloud portal and wipe confidential information, eliminating the risk of business data being misappropriated. Additional features such as two-factor authentication, device trace and high level encryption provide further protection against data leakage and theft.

Having this level of control and management in place will ultimately allow IT managers to sleep more soundly, safe in the knowledge that data is more secure and easily managed through an intuitive web interface. At the same time, it will prevent employees having to resort to using consumer cloud storage services to access their files remotely and share files with other parties making everyone a winner.

SHARETweet about this on TwitterShare on LinkedInShare on FacebookShare on Google+Pin on PinterestDigg thisShare on RedditShare on TumblrShare on StumbleUponEmail this to someone
Paul Evans

Paul Evans is the Managing Director and co-founder with Tony Ruane of Redstor, which they commenced in 1998. Paul started his career as a Lawyer with Shoosmiths and Harrison back in 1993 before realising this was not his vocation and decided to move into IT at the end of 1994. He subsequently joined Memory and then Shuttle Technology ending up as Business Development Director. In this role he spent 2 years in the States building and establishing New Sales Channels and developing new markets and then repeating the recipe in Japan for over a year before deciding he wanted to run his own business. In his current role, Paul is responsible for setting the strategic direction of the business, investigating and developing new business opportunities and leading the marketing team.

  • Danny ruthe

    There is no doubt there has been a proliferation of mobile devices and tablets around the world. I do agree that there is a difference in how the first world people use their mobile devices as compared to third world. We are seeing a big sentiment change among mobile phone users across the globe. They are using their devices almost all the time from texting endlessly to clicking photos, accessing GPS on the go, Internet usage, social media and games on their mobile phones. Some people are already carrying two mobile phones without complaining cause that helps them to keep their personal data and work data separate.

    There are also many who prefer to bring their own devices (BYOD) to office, connect it to work intranet and access files/folders, cloud services, emails and much more right on their personal mobile devices. There is too much data today on their mobile devices, almost for all people like their contacts, their personal and friends’ social media details, text, emails, photos, notes, videos, documents and more. Should we need to say more about the current importance of having remote access to our beloved mobile devices?

    Have remote access to remote wipe the target device, unlock/lock it, and get SIM info, current GPS and more. One such mobile monitoring and recovery app available for users is Mobile Spy.