5 approaches to securing your company’s mobile data

By   ISBuzz Team
Writer , Information Security Buzz | Jun 10, 2013 03:52 am PST

The simultaneous explosion of enterprise mobility and cloud adoption has resulted in a “perfect storm” for IT. It’s the “everywhere data” side effect created by bring your own device (BYOD) programs — data is now coming from anywhere and everywhere, making it hard for IT departments to keep up.

Data traveling from corporate servers to unsecured personal devices to apps and into the cloud leaves a digital paper trail of copies everywhere along its route. Gartner vice president David Willis recently highlighted this phenomenon saying, “Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.”

SOURCE: venturebeat.com

Notify of
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

Would love your thoughts, please comment.x