Menu
​Examining data security in the age of the mobile office

​Examining data security in the age of the mobile office

The rise of mobility has presented businesses with new opportunities and new threats.

The rise of mobility has presented businesses with new opportunities and new threats. While work can now be done from anywhere in the world, the security of sensitive data is at risk.

As a result, organisations must take measures to protect business information on mobile devices.

“Smartphones, tablets, and other mobile devices have become valuable work tools for many businesses and their employees,” says Lincoln Goldsmith, General Manager of Australia and New Zealand, Acronis.

“Businesses need to ensure maximum security for information that is being transferred along a great number of insecure networks, including being loaded into public cloud servers, such as Google or Dropbox.”

Many threats can be dealt with using traditional security software and systems.

For example, IT departments can track data security in public spaces, such as the cloud. It is much more difficult for IT departments to control who is accessing information on an employee’s tablet or notebook.

Likewise, it is difficult to determine who could be intercepting information as mobile data is transferred to the network, or an external server.

“Data stored on a corporate server is protected from unauthorised access by a firewall, and general risks arise only when this information leaves the server,” Goldsmith adds.

“The first challenge for organisations wanting to protect data being transferred to and from mobile devices is to protect out-putted files as they are transferred over the network.”

For Goldsmith, encryption can meet this challenge.

“Good encryption software means that employees can collaborate remotely, with changes to documents and other files sent back to an organisation’s server in encrypted form,” he adds.

“As a result, employees can work with data on a corporate server from any place in the world without exposing it to risks common in mail services and general availability services.”

For a business to make the most of a sensitive information processing environment incorporating encryption, Goldsmith believes the system must comply with at least three basic criteria:

1) Usability

An appropriate security solution needs to be usable for regular employees, as well as the IT department. It is no secret that much of the technology associated with corporate security is often in conflict with user-friendliness.

That is why files, despite all the risks, so often end up in user-friendly, cloud-based platforms such as Dropbox.

2) Interoperability

A good solution must work with any device. The era of companies buying hundreds of identical laptops is ending as the bring-your-own-device (BYOD) trend takes hold.

It is more convenient for employees to use their own devices for business purposes, and at the same time it relieves businesses of extra costs.

3) Maximum security at different access levels

A good security system needs to ensure maximum protection at a variety of different access levels. Sometimes employees need to work with even the most secret data.

Some people are not supposed to see this data at all, others may only view it, and a few have the right to change or destroy it. All of this needs to be done without harming productivity or security.

“With the right systems in place, businesses can make the most of mobility without sacrificing security,” Goldsmith adds.

“Encryption lets organisation adopt a hyper-mobile approach to the workplace, making it easier for work to be done safely from anywhere at any time.”


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Acronis

Events

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments