A Case for Updating Your Outdated Mobile Security Policy
A Case for Updating Your Outdated Mobile Security Policy

Data loss is undoubtedly a growing concern within many organizations and your outdated (or nonexistent) mobile security policy may not cut it. Your current mobile security policy may be too restricting for certain types of business activity and could be putting your company at risk of a data breach.

The reality is, your employees need to be mobile to carryout certain job functions, and you need to protect your sensitive data. Therefore, your mobile security policy may need to be updated to accommodate these new requirements. However, with this policy update, another issue arises — you now need to be able to securely track and monitor devices and the data they contain.

Do Your Employees Understand Your Mobile Security Policy?

A report earlier this year indicated that as much as 45% of data is held on the endpoint, often without corporate knowledge or security oversight. Indeed, another report suggests that 37% of employees believe they currently access sensitive data they shouldn’t be accessing. Right now, exploited mobile devices account for one third of cyber security incidents, not to mention the myriad of other ways employees intentionally or accidentally put data at risk on the endpoint.

As an organization, you’re responsible for this noncompliance, and yet you currently have no way to track and monitor your endpoints or the data they contain.

This lack of control places your organization at risk for:

  • Loss of proprietary information, intellectual property, and sensitive data
  • Reputational and financial risk
  • High costs of trying to ensure data protection due to manual processes
  • Loss of competitive advantage due to data loss

Verify User and Device Activity with Absolute

With Absolute DDS 6, we provide an unprecedented level of visibility into data on the endpoint. Absolute Endpoint Data Discovery (EDD), a feature of Absolute DDS, allows organizations to specify the sensitive or proprietary information that they want to keep track of so it can be tracked, on any endpoint, with the ability to take preemptive or remedial action if needed. Most of our customers are pretty surprised at the results of their first scan: sensitive data is everywhere.

EDD allows organizations to shine a light on dark data at endpoints, allowing organizations to create custom data tracking, set risk profiles for user behaviors and specific device activity that would all trigger a risk warning, such as a device outside an expected geographic area, the presence of sensitive data, the disabling of encryption, or other evidence of unusual behavior or device activity. These automatic alerts allow IT to take rapid response to external or internal security threats, remotely deleting data, even when you don’t have control over the device.

Of course, EDD has obvious applications for heavily regulated industries in proving compliance, but we believe it has relevance beyond that, particularly when it comes to addressing the insider threat. Our patented Persistence technology allows you to extend your endpoint monitoring and protection capabilities beyond the limitations of traditional software solutions. With Absolute, you’re always in control. Get started with a free evaluation version of Absolute DDS today.

ABOUT THE AUTHOR

Arieanna Schweber

Arieanna Schweber has been a part of the Absolute writing team since 2007. Arieanna was Canada’s first female professional blogger and has been professionally blogging since 2006 and has spoken at leading blogging conferences including BlogHer and Northern Voice. Arieanna has a joint degree in Business and Communications from Simon Fraser University and continues to build communities for Vancouver-based clients.