Mobile security: Thinking outside the box

The rise of mobile devices – smartphones, tablets and laptops – has transformed the working landscape; employees are able to work on the move, beyond the constraints of the office’s four walls and a nine-to-five routine. By Stephen Midgley, Vice President Global Marketing at Absolute Software.

  • 10 years ago Posted in

DATA CENTRE INFRASTRUCTURE MANAGEMENT (DCIM) apps have progressed even further. Managers can do aspects of their jobs while away from the office, such as viewing capacity utilisation in real time and predicting energy consumption.

While the adoption of Bring Your Own Device (BYOD) policies increases workforce efficiency and employee satisfaction, it can be something of a double-edged sword, in that it may also play a significant role in the rise of data attacks and cybercrime. With data centre employees using devices both in the office and at home, the device itself can be vulnerable to theft or loss, but the data within it is also at risk.


The tides are turning
Recent research from industry analysts, Juniper Research, identifies that cyber criminals are now turning their attention away from traditional PC hacking and malware based attacks, towards targeted attacks on mobile devices. What makes this worrying is how the research also indicated that although 325 million mobile devices are expected to install security measures this year, this leaves a further 80% of the total UK devices unprotected.
With remote working in DCIM becoming the norm, this isn’t just a problem for the device owner but potentially for their employers as well. Responsible for a range of clients’ data, news of a data breach would not only damage their public profiles, but also the data centre’s reputation as a secure storage facility. Damage to customer confidence could therefore greatly diminish or even destroy business relationships.


Danger apps
Moreover, chances are that if data centre employees are utilising their own devices for both work and personal use, they probably have a multitude of non-work applications on their phone. This can result in seemingly secure devices harbouring unexpected vulnerabilities. For example, you could download an outwardly normal app that could contain hidden malware that has the capability to steal data from the device. Cloud storage apps that keep files synced for employees on the move, are another cause for concern. Apps such as these could provide access to sensitive files, leaving the data accessible to all. Some may argue that they have robust security provisions in place such as multiple passcodes or even fingerprint verification. However, individuals should not underestimate the lengths that criminals will go to.


Strict rules aren’t the answer
Introducing stricter mobility rules is often thought of as a potential business-wide solution. This is one of the biggest misconceptions about managing the influx of mobile devices in the workplace. Employees will break the rules every time, either through naivety, ignorance or ingenuity. While a stolen device can easily be replaced, missing and compromised data has already done its damage.


With every device now a potential gateway into a data centre’s infrastructure and the data held within it; a system must be put in place to track, manage and secure employee devices. This open window of opportunity to access both the business and client data held on devices, has resulted in an increased shift for company’s opting to either retrieve or permanently delete the data stored on stolen or lost devices.

Our latest Endpoint Security Report found that remote file retrievals are on the up, with an increase of 135% on last year. As well as retrieval, there is also more stress put on eliminating the data completely; we found that remote data deletes increased in this year’s report by 34% on the previous year.


Despite all rational preparation, sometimes device loss is inevitable, no matter how careful you are.


By implementing security policies that enable remote retrieval or complete wipes, businesses are still able to implement BYOD policies to support efficiency and flexibility, but with a reduced risk of data breaches.

BYOD is now everywhere. IT managers need to ensure they’re implementing security measures that will protect not only the increasing array of mobile endpoints being used, but their organisations and their customers’ data as well. Solutions need to provide visibility and the flexibility to support different devices and applications to provide IT managers with the assurance required to embrace this new era. When you get it right, it’s as simple as ‘track, manage and secure’ for the devices and information, within and outside of your data centre.