Menu
​Examining data security in the age of the mobile office

​Examining data security in the age of the mobile office

The rise of mobility has presented businesses with new opportunities and new threats.

The rise of mobility has presented businesses with new opportunities and new threats. While work can now be done from anywhere in the world, the security of sensitive data is at risk.

As a result, organisations must take measures to protect business information on mobile devices.

“Smartphones, tablets, and other mobile devices have become valuable work tools for many businesses and their employees,” says Lincoln Goldsmith, General Manager of Australia and New Zealand, Acronis.

“Businesses need to ensure maximum security for information that is being transferred along a great number of insecure networks, including being loaded into public cloud servers, such as Google or Dropbox.”

Many threats can be dealt with using traditional security software and systems.

For example, IT departments can track data security in public spaces, such as the cloud. It is much more difficult for IT departments to control who is accessing information on an employee’s tablet or notebook.

Likewise, it is difficult to determine who could be intercepting information as mobile data is transferred to the network, or an external server.

“Data stored on a corporate server is protected from unauthorised access by a firewall, and general risks arise only when this information leaves the server,” Goldsmith adds.

“The first challenge for organisations wanting to protect data being transferred to and from mobile devices is to protect out-putted files as they are transferred over the network.”

For Goldsmith, encryption can meet this challenge.

“Good encryption software means that employees can collaborate remotely, with changes to documents and other files sent back to an organisation’s server in encrypted form,” he adds.

“As a result, employees can work with data on a corporate server from any place in the world without exposing it to risks common in mail services and general availability services.”

For a business to make the most of a sensitive information processing environment incorporating encryption, Goldsmith believes the system must comply with at least three basic criteria:

1) Usability

An appropriate security solution needs to be usable for regular employees, as well as the IT department. It is no secret that much of the technology associated with corporate security is often in conflict with user-friendliness.

That is why files, despite all the risks, so often end up in user-friendly, cloud-based platforms such as Dropbox.

2) Interoperability

A good solution must work with any device. The era of companies buying hundreds of identical laptops is ending as the bring-your-own-device (BYOD) trend takes hold.

It is more convenient for employees to use their own devices for business purposes, and at the same time it relieves businesses of extra costs.

3) Maximum security at different access levels

A good security system needs to ensure maximum protection at a variety of different access levels. Sometimes employees need to work with even the most secret data.

Some people are not supposed to see this data at all, others may only view it, and a few have the right to change or destroy it. All of this needs to be done without harming productivity or security.

“With the right systems in place, businesses can make the most of mobility without sacrificing security,” Goldsmith adds.

“Encryption lets organisation adopt a hyper-mobile approach to the workplace, making it easier for work to be done safely from anywhere at any time.”

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Acronisdatasecurity

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments