Do you choose to ignore the consequences from a lack of mobile data security?
No matter what size your company is a proper mobile asset management process is crucial. Company financials, private passwords, personal customer data and so much more can be leaked through the cracks if devices are not properly sanitized by a certified IT asset management vendor.
Mobile devices are clearly not few and far between these days. With tech enthusiasts demanding a new cell phone every few months, it is difficult for manufacturers to be consistent with models in an industry that caters to the consumer rather than the corporate market. Resulting in basic security protocols falling short in an increasing BYOD world.
Attempts by cyber criminals to crack codes and penetrate corporate systems do not look like they will slow if companies keep allowing insecure mobile devices to run rampant and mismanaged.
Employees can’t walk on eggshells forever. Sooner or later, one will crack and unintentionally open a high-risk window to let cyber criminals have access to sensitive corporate data.
New research was recently introduced that suggested one million high-risk Android apps entered the enterprise last year. Sophos Network Security, antivirus and security firm, cautioned that Android malware can place a company’s future at risk by exposing strategic information or stealing passwords.
Hitting a little closer to home, another study analyzed 2 million Android apps currently on the market, classifying nearly 300,000 as outright malicious and an approximate 150,000 as high-risk. Considering, the study did not even cover iOS, Windows Mobile, BlackBerry, etc., the IT spectrum is understandably no longer solely focused on securing a Windows-based ecosystem against cyber attacks.
Organizations must be significantly more proactive in how they manage smartphones, tablets and other mobile device if they continue to pursue a BYOD program. Some businesses choose to ignore the consequences.
The companies practicing outdated methods, such as a silo security system, would be wise to upgrade to a system that blocks a cyber attack before it occurs and connect the best practices from all corners before it’s too late. IT departments need to break open the silos, integrate critical technology and educate each other company wide on risks and protocol involving mobile security.
If you are to stem the tide of mobile attacks, you’ve got to build a better dam.
Forbes reported on a survey conducted by Motorola and their findings may make your IT department cringe:
2 out 3 people realize that the responsibility falls on them, rather than the IT department, to keep mobile data private and secure.
Some even went as far to respond “I’d rather share my toothbrush than my phone!”
73% of respondents said they are concerned about smartphone security
More than half of respondents admit they’ve sent work email or sensitive documents to their personal email accounts on their phones
77% can name at least one thing they’re more familiar with than their company’s IT security policies
Moral of the story? Employees want and need mobile security! They can’t walk on eggshells forever. Sooner or later, one will crack and unintentionally open a high-risk window to let cyber criminals have access to sensitive corporate data.
Take advantage of HOBI’s innovative solution to alleviate the burden and minimize the expense of mobile data security from an asset’s beginning to end of life. HOBI provides the highest level of security from expert data management, on-site data erasure services, on-site destruction, or secured transportation. HOBI uses best-in-class tech teams across the U.S. to provide NIST 800-18 and DOD compliant data sanitation and data destruction. This is a fully traceable and documented system for inventory and erasure.
Catch HOBI President, Craig Boswell, at the IAITAM Spring Ace Conference as he speaks from the point of view of an IT asset management vendor on the issue of mobile data security.