Menu
​Examining data security in the age of the mobile office

​Examining data security in the age of the mobile office

The rise of mobility has presented businesses with new opportunities and new threats.

The rise of mobility has presented businesses with new opportunities and new threats. While work can now be done from anywhere in the world, the security of sensitive data is at risk.

As a result, organisations must take measures to protect business information on mobile devices.

“Smartphones, tablets, and other mobile devices have become valuable work tools for many businesses and their employees,” says Lincoln Goldsmith, General Manager of Australia and New Zealand, Acronis.

“Businesses need to ensure maximum security for information that is being transferred along a great number of insecure networks, including being loaded into public cloud servers, such as Google or Dropbox.”

Many threats can be dealt with using traditional security software and systems.

For example, IT departments can track data security in public spaces, such as the cloud. It is much more difficult for IT departments to control who is accessing information on an employee’s tablet or notebook.

Likewise, it is difficult to determine who could be intercepting information as mobile data is transferred to the network, or an external server.

“Data stored on a corporate server is protected from unauthorised access by a firewall, and general risks arise only when this information leaves the server,” Goldsmith adds.

“The first challenge for organisations wanting to protect data being transferred to and from mobile devices is to protect out-putted files as they are transferred over the network.”

For Goldsmith, encryption can meet this challenge.

“Good encryption software means that employees can collaborate remotely, with changes to documents and other files sent back to an organisation’s server in encrypted form,” he adds.

“As a result, employees can work with data on a corporate server from any place in the world without exposing it to risks common in mail services and general availability services.”

For a business to make the most of a sensitive information processing environment incorporating encryption, Goldsmith believes the system must comply with at least three basic criteria:

1) Usability

An appropriate security solution needs to be usable for regular employees, as well as the IT department. It is no secret that much of the technology associated with corporate security is often in conflict with user-friendliness.

That is why files, despite all the risks, so often end up in user-friendly, cloud-based platforms such as Dropbox.

2) Interoperability

A good solution must work with any device. The era of companies buying hundreds of identical laptops is ending as the bring-your-own-device (BYOD) trend takes hold.

It is more convenient for employees to use their own devices for business purposes, and at the same time it relieves businesses of extra costs.

3) Maximum security at different access levels

A good security system needs to ensure maximum protection at a variety of different access levels. Sometimes employees need to work with even the most secret data.

Some people are not supposed to see this data at all, others may only view it, and a few have the right to change or destroy it. All of this needs to be done without harming productivity or security.

“With the right systems in place, businesses can make the most of mobility without sacrificing security,” Goldsmith adds.

“Encryption lets organisation adopt a hyper-mobile approach to the workplace, making it easier for work to be done safely from anywhere at any time.”

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Acronisdatasecurity

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments