Tuesday, September 23, 2014

Personal devices are gaining popularity both at work … – Telix.pl

An increasing number of employees benefit from access to corporate data through personal devices. What’s more, employers do not prohibit this practice, and even approve of it. According to Gartner, by 2017 almost half of employers will require employees to their own devices, which will be used for professional purposes. The benefits for each party seem obvious: increased productivity for staff working on their own, comfortable facilities, as well as lower costs for the company. Unfortunately, the situation does not look so rosy.

 Marek Markowski, head of the company MARKEN Anti-virus systems, notes that the steadily increasing amount of malware. Risk of escape corporate data to which workers gain access with their own private facilities, is large. – are seeing some kind of invasion of the Android system. According to estimates, by 2015 the majority of mobile applications will not be equipped with even basic security protocols to protect business data sets. Moreover, in the five years mobile equipment is an integral part of the strategy of most companies – says Marek Markowski.

 Increased mobility is a greater risk of lost or stolen equipment. Consequently, it is related to the possibility of unauthorized access to corporate data. Trend abbreviated BYOD (Bring Your Own Device – bring your own device), despite the many benefits, also generates a large number of threats. They may cost the company much more than cost savings associated with the use of BYOD. – corporate security strategies should include all devices that access corporate data. Also, these private. In Poland, it is not the best. With our companies leak data. These types of events are held in secret and outside of a handful of specialists, hardly anyone finds out about them. However, I can confirm that occur and lead to many crisis situations – says Marek Markowski.
 

 Data Security Checklist

 The basic functions of safety management devices such as data erasure, blocking, remote monitoring, are no longer sufficient to protect the data processed by different channels. A strong BYOD policy should cover them all. Needed include the following procedure:

     - Data encryption – both stored on your employee and transferred various carriers;

     - Access control to the application, port knocking, white lists and intrusion prevention system for enterprise applications that communicate with servers by company;

     - Detection and removal of malware on mobile devices;

     - The use of the scanning application Web sites in real time;

     - Use of management software licenses

Source: MARKEN Anti-virus systems

CAN

LikeTweet

No comments:

Post a Comment