Cloud & Mobile Security: Data Security Tips

Cloud & Mobile Security: Data Security Tips

Cloud and Mobile Security

Data Security is a wide variety of challenges and opportunities raised by modern technology, such as cloud computing and mobile devices. Mobile devices are a part of our life. Just imagine your day without a mobile phone! We depend on the devices much more. So having a mobile security is very important.



Mobile phone repairs crawley computer centre

In all the hubbub around mobile users increasingly making their own choices of operating systems and hardware, something has been lost sight of – it doesn’t really matter if you bring your own device (BYOD), a more pressing matter for businesses should be where is our data accessed? (WODA).

Video about Cloud Security


This issue extends beyond the choice of the mobile endpoint as increasingly ‘mobile’ doesn’t simply mean a single mobile touchscreen tablet alternative to a fixed desktop PC, but multiple points or modes of access with users flitting between them to use whichever is most appropriate (or to hand) at any moment in time. What has become mobile is the point of access to the business process, not just the hardware.

This multiplicity of points of mobile access – some corporate owned, some not – means that when IT services are required on the move they are often best delivered ‘as a service’ from the network, so it is no wonder that the growth in acceptance of cloud seems to have symbiotically mirrored the growth of mobile.

Both pose a similar challenge to the embattled IT manager. A significant element of control has been taken away – essentially the steady operating platform ‘rug’ has been pulled from under their feet.

So how do they retain some balance and control?

The first thing is to accept that things have changed. BYOD is more than a short-lived fad; most people have embraced their inner nerd and now have an opinion about what technology they like to use, and what they don’t like. They buy it and use it as a fundamental part of their personal life from making social connections to paying utility bills. Most people are more productive if comfortable with familiar technology, so why force them to use something else?

However, enterprise data needs to be under enterprise control. Concerns about data are generally much higher than those surrounding applications and the devices themselves. This is a sensible, if accidental, prioritisation of how to deal with BYOD – first focus on corporate data. Unfortunately, few organisations have either a full document classification system or an approach to store mobile data in encrypted containers separated from the rest of the data and apps that will reside on BYO devices.

Read rest of the article here

Source : Rob Bamforth

Image Source : Johan Larsson