The move to mobile is no longer a second thought. Almost two billion cell phones were sold last year, and 82 percent of the sold devices were smartphones. For this reason, more enterprises are utilizing a BYOD policy.
When switching to BYOD, it’s encouraged for enterprises to run a risk assessment to prepare for any potential mobile vulnerabilities. Two major
- The four Ws of data access
- Along with the type of information being accessed through a mobile platform, enterprises should take into account who is accessing these files, what files they are accessing and where they are accessing them. Upgrading a BYOD policy means understanding what data is accessed on which networks, so that any potential holes can be assessed and protocol can be written around these vulnerabilities.
- Potential residual data
- Switching to BYOD increases chances of recycling or reselling old devices. While just performing a standard data wipe, or deleting items off a device, may seem sufficient enough, there can be remnants of old data left behind. A study issued by Blancco Technology found trace amounts of data from previous users on resold devices.
Upgrading a BYOD policy may be intimidating when considering potential data vulnerabilities and pathways for older devices, but one way to decrease BYOD anxiety is to pair with a certified mobile asset manager.
HOBI International, Inc. is a R2, RIOS, ISO 14001 certified mobile asset management company. HOBI uses the best practices in full scale mobile asset management, including data management, reverse logistics, data erasure, device remarketing and device recycling.