Site icon Information Security Buzz

5 approaches to securing your company’s mobile data

A water tap with a digital clock on it that provides securing and mobile data functionalities.

A water tap with a digital clock on it that provides securing and mobile data functionalities.

The simultaneous explosion of enterprise mobility and cloud adoption has resulted in a “perfect storm” for IT. It’s the “everywhere data” side effect created by bring your own device (BYOD) programs — data is now coming from anywhere and everywhere, making it hard for IT departments to keep up.

Data traveling from corporate servers to unsecured personal devices to apps and into the cloud leaves a digital paper trail of copies everywhere along its route. Gartner vice president David Willis recently highlighted this phenomenon saying, “Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.”

SOURCE: venturebeat.com

About the Author

Exit mobile version