Mobile device security

More than forty percent of staffs are using mobile devices such as smartphones and tablet personal computers to plan and organize their work and life, related surveys have suggested. Moreover, eighty percent of them have admitted that they are utilizing the intranet without gaining corresponding permission. In such cases, confidential business data are not secure, unless effective measures are taken to control intranet use. Once staffs" mobile devices are lost, certain significant business data may be leaked out from those devices, bringing enterprise massive losses.

As is well known, numerous kinds of measures are taken to protect enterprise business data from being leaked out such as data encryption, real-time wiping discarded mobile device data, etc. However, business data security is still subject to staff privacy and expectation. To ease mobile device security in enterprise, several effective suggestions are introduced below:

1. Mobile device lock
Device lock is the first defensive line set to protect enterprise business data or account from being accessed by unauthorized mobile devices or tablet personal computers. However, the vast majority of staffs" mobile devices are not equipped with powerful device lock. Moreover, it is always a piece of annoying work to strike a balance between password setting and flexible device use. In this condition, to maintain mobile device security, enterprise network managers can provides staffs with a fixed application, via which staffs" mobile devices can get registered and checked. In this way, sub-standard business applications will not be allowed. Then, automatically configure mobile casino registered devices to activate internal PIN or password lock, so as to lower the risk of enterprise business data leakage. Finally, implement wireless device monitoring so as to prevent the device setting from being tampered.

2. Remote data wiping on mobile device
The function of remote data wiping on mobile device can help enterprise network managers to protect business data or account stored in certain registered mobile device from being accessed, if the device is lost, stolen or its owner have resigned. Though certain solution can protect mobile device security, it is somewhat impractical, for it will bring inconvenience to staffs. The following are some solutions: At first, staffs can not be allowed to use intranet unless they agree with the intranet use terms, which regulate the intranet usage conditions and proper remote data wiping measures. Also, enterprise managers can employ different data encryption tools to encrypt different types of data. For instance, the self-encryption tool can be used to save emails, contacts, calendar and other significant data to a sandbox which asks for authorization and the sandbox can be removed without wiping the entire device.

3. Mobile device locating and tracking
Almost all information about mobile device use can be recorded such as login location. With the help of on-going tracking, enterprise network managers can locate the lost mobile device and be aware of the gained roaming reminders. However, staff"s" privacy settings may block tracking, and it is quite hard to locate the mobile device when network is disconnected. Finally, to implement the measure, enterprise has to spend a large sum of cost. It is noteworthy that enterprise should take staff privacy and cost into consideration if they want to take this measure to maintain mobile device security.