Mobile security and the ways to mitigate data risk in a BYOD environment


Mobile devices are the mighty double-edged swords of today's workplace. On the one hand, they provide greater integration of information, on the other, they could be your business's one-way ticket to a catastrophic security breach. This week we had the amazing opportunity to speak with Anthony Kinney, Microsoft's Verizon Partner Manager, about mobile security and the ways to mitigate data risk in a BYOD environment.

According to Kinney, the three main security risk areas associated with BYOD are:

  1. Data loss prevention, which has to do with securing the data on a device in the
    case of it being lost or stolen.
  2. Data in transit, which is most often
    protected by encrypting information to ensure that all communications between
    the device and backend infrastructure are secure.
  3. Data leakage, which is
    about keeping a user's work and personal information separate. In other words,
    "protecting users from themselves."

We asked Kinney what Microsoft is doing to make sure that moving to a pocket office doesn't mean introducing security risk. He discussed how our multilayered approach to security makes adopting a BYOD policy far less of a risk, with solutions like Secure boot technology, remote "wipe" capabilities, and automatic cloud storage (among other security solutions).
   

What makes the greatest difference, however, are the actions a company takes to ensure that their data is secure. The way Kinney sees it, employees jailbreaking and rooting devices is one of the largest risk factors for companies who allow employees to BYOD. What those companies do is implement third-party services to "containerize the data," so it never actually goes onto the local device.
   

According to Kinney, Windows Phone solves for this by protecting the data at the data center level before it even gets to the device. This means each document can have specific edit/view/share settings so that when it's accessed on a mobile device it can't be 'saved as' or forwarded to another cloud service, depending on what the settings permit. This way the phone fully understands the corporate policies on the document, helping IT to provide security—even at the file level.
   

This level of device integration with your data allows your company to consider a BYOD or CYOD policy without the need for third-party security solutions—which themselves offer another point of potential failure and risk. By working with your existing desktop OS, email, and other systems, the native Windows Phone OS helps mitigate data loss risk for your pocket office by preventing it in the first place.

Need insurance for You, Your Family or Your Business?
We can match you to a qualified, local insurance expert!
Further Reading
Healthy employees are more productive, happier and satisfied. They also reduce healthcare costs. To boost employee participation in healthy exercise, implement five tips at the office. 1. Build a Gym Time and financial limitations are the two most...
There is an unbendable and unbreakable law of economics that states that wealth is created in one of only two ways: People working, or money working. Many have attempted to break this law, and usually the results have violated both civil and criminal...
One of the best ways to protect workers in a particular job is to conduct a job hazard analysis. This simple but powerful technique identifies hazards before they occur, focusing on the relationships among the worker, task, tools and equipment, and ...
About three in four drug or alcohol abusers have jobs – and they don’t leave their problems at the door when they arrive at work! According to OSHA, an effective drug-free workplace program should have five components: A Drug-Free Workplace Poli...
Workplace conditions have a substantial impact on employee performance. By workplace conditions, we aren’t just referring to an employee having the opportunity to advance, being recognized for a job well done, or salary or benefit offerings. Believe ...