Is it justified for individuals to have full faith in their 'reliable' gadgets?
In the digital age, protecting sensitive corporate data has become a top priority for organisations worldwide. While Information Technology (IT) systems can label devices as 'trusted' or 'untrusted', it's the data that truly needs safeguarding.
Historically, Windows-based computers were the corporate-issued devices of choice, but the landscape has shifted. Today, iOS devices account for over 80% of mobile devices used in enterprises globally, with Android following closely at 18%.
The rise of iOS devices in the enterprise can be attributed to Apple's focus on security and the closed nature of their operating system. iOS is often seen as a more secure option compared to other mobile platforms, making it a preferred choice for companies handling sensitive data.
As the use of mobile devices in enterprises continues to grow, organisations are implementing Mobile Device Management (MDM) and Mobile Application Management (MAM) to regain control over these devices. These solutions enable IT departments to enforce security policies, manage devices centrally, and even wipe corporate data if a device is compromised.
However, the concept of 'trusted devices' can be misleading. While MDM and MAM solutions provide significant security benefits, no device is completely secure from data leakage. It's crucial for companies to focus on securing corporate data, not the device itself.
To secure corporate data on trusted mobile devices while respecting employee privacy, several best practices have emerged:
- Strong Authentication: Implement multi-layered authentication, such as biometrics, two-factor authentication, and risk-adaptive controls, to secure device access.
- Data Encryption: Encrypt sensitive data on the device and during transmission to ensure data remains confidential even if the device is lost or intercepted.
- MDM and BYOD Policies: Deploy MDM solutions to enforce security policies, while allowing personal data and apps to remain private. BYOD policies should require device encryption and password protection but respect user autonomy.
- Minimal Data Storage on Device: Avoid storing unnecessary sensitive data on mobile devices to reduce risk.
- Access Control and Least Privilege: Limit access to corporate data strictly to those who need it, requiring contextual authentication such as risk-adaptive controls that adjust based on user behavior and environment.
- Employee Privacy Respect: Adopt permissive or trust-based usage policies where personal device data usage is not extensively monitored or restricted, fostering trust and autonomy in knowledge workers.
- Regular Updates and Training: Keep mobile OS and apps patched and educate employees on security best practices to reduce risks from social engineering or device misconfiguration.
While these strategies help protect corporate data on trusted mobile devices, they also aim to respect employee privacy. However, it's important to note that only 44% of employees would accept MDM or MAM on their personal phones, according to a recent study. This highlights the need for organisations to strike a balance between security and employee privacy.
A relatively new approach to mobile security is 'agentless' BYOD solutions, which do not install software agents on employee devices and only monitor corporate data. This approach may address some privacy concerns associated with traditional MDM solutions.
In conclusion, securing corporate data on mobile devices requires a multi-layered approach that balances security with usability and respect for employee privacy. As the use of mobile devices in enterprises continues to grow, it's essential for organisations to stay vigilant and adapt their strategies to address new threats and privacy concerns.
[1] Bitglass Study: Best Practices for Securing Corporate Data on Mobile Devices [2] Jamf Study: Securing Apple Devices in the Enterprise [3] Cybersecurity Ventures: The Evolution of Mobile Device Management (MDM) [4] Forrester Report: Mobile Security Strategy for the Modern Enterprise
- In the realm of personal-finance and business, the implementation of 'agentless' BYOD solutions can be beneficial, as they monitor corporate data without installing software on employee devices, potentially alleviating privacy concerns.
- As technology advances and data-and-cloud-computing becomes increasingly important, it's crucial for organisations to consider the use of Mobile Device Management (MDM) and Mobile Application Management (MAM) in their cybersecurity strategies, as these solutions can help enforce security policies and manage devices centrally, protecting sensitive corporate data.
- While the focus on safeguarding sensitive corporate data is paramount for organisations in the digital age, it's equally important for companies to strike a balance between security and employee privacy, as shown by the statistic that only 44% of employees would accept MDM or MAM on their personal phones.