How to Manage Mobility Risk to Empower Your Organization
How to Manage Mobility Risk to Empower Your Organization

Enterprise mobility is just a given now, a necessary requirement for organizations wishing to compete and grow. Employees can connect how they want, wherever they want, and organizations have the power to engage with customers in real-time. The shift has come with great advantages, but supporting mobility is not without challenges. There are thousands of apps that could be used for a wide range of enterprise functions, yet organizations are still hesitating to move forward, mostly due to security fears.

I recently wrote about enterprise mobility and what I sees as the stumbling blocks to success, and how to overcome them. The WIRED InnovationInsights article, “Taking Care of Business Means Taking Care of Mobility,” gives you tangible ways you can define your mobility risk, manage it, and empower your business by embracing mobility.

Many organizations have been hindering the adoption of mobile technologies and apps through fear and lack of trust. If you’re not convinced your endpoints are secure and compliant, and that you can both identify and mitigate risks, then it’s hard to embrace the benefits of mobility. Mobility is supposed to empower the business, not inhibit it!

Right now, 76% of CIOs and other business leaders consider security their top mobile concern. So, instead of supporting the organization, mobility has become a distraction. It’s time to change this. Define the mobility risk, then manage it.

In the article, I outline 3 ways you can define mobility risk:

  • The acceleration of the number of mobile endpoints
  • The growth of corporate data
  • The endpoint as an attack vector

Compromising mobile endpoints can mean more than just accessing the data they contain. Endpoints can also be used as a broader attack surface providing access to your data center, user passwords, security certificates, encryption credentials, and your corporate network. Loss or theft of devices, mobile apps, unsecured transmission of corporate data, phishing attacks and more all present data security issues.

How do you tackle these mobility risks? With a layered approach, with back-up plans for your back-up plans, supported by both policy and education. Endpoint and data security is seen primarily as an IT mandate. But CEOs, the Board, and every employee have a responsibility to protect corporate data.

ABOUT THE AUTHOR

Geoff Haydon

Geoff Haydon is the Chief Executive Officer at Absolute. A veteran IT industry leader, Geoff has over 25 years of experience in the enterprise software and security market and has held senior executive leadership sales and operations positions for organizations in the Americas and the Asia Pacific region