Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

How To Protect Your Data In A Mobile Environment

Posted by Caroline Le Brun | November 15, 2013 8:00 AM

And how to master compliance

Mobile technologies are challenging data security for the Chief Information Officers (CIOs). Compliance is more difficult to implement in an environment where many threats emerge from several fronts.

Cimpl protects your data

An article from the CIO magazine, 7 Biggest IT Compliance Headaches and How CIOs Can Cure Them highlights the problems and offers solutions to protect data. Protect your company data against internal and external threats with:

  • Internal education.

  • New tools.

  • Safety rules.

Knowledge makes you stronger, especially in the telecommunications and IT industry. Ignoring the problem could be fatal to your business. It is necessary to update your and your employees' knowledge about products and services.

Inform and manage your staff about usage

Prevent hacking

The CIO's mission is to educate employees about the threats of hacking by giving them the resources to prevent data theft. For Jim Garrett, CIO at 3M group,"Low-tech methods like snooping, social-engineering or phishing are common techniques used by hackers against employees to gain unauthorized access to corporate information."

Employees must follow IT security internal policies and understand the dangers for the company, but also know how to act when things happen.

Track assets usage and non-usage

For security and compliance reasons it is necessary to collect RSS feeds and identify the softwares installed on the devices. Ensure that there is no need unused softwares in order to reduce risk.

During the decommissioning procedure, check that all data is erased on the equipment before disposal or reassignment.

Install a Departure Process Management to identify and retrieve devices from leaving employees.

Shadow IT

Information transmission applications are very popular within the employees because it simplifies work but some the Shadow IT is not certified compliant and therefore is out of the CIO's control.

To curb this practice, the use of a System Center Configuration Manager (SCCM) helps by providing the inventory of all equipments services. Audit is also a good way to get an overview of all the services employees use.

Conform your assets to better defend yourself

Protect your mobile devices and BYOD

Mobile technologies give a major headache for CIOs when it comes to monitoring data. According to a study by the Ponemon Insitute Risks of regulations on data on mobile devices, most companies struggle to protect data on mobile devices.

Whether it is a corporate or a personal mobile (BYOD), it is essential to establish safety rules for mobile devices:

  • For employees on the move, providing travel computers would be a perfect solution

  • Check the frequency of services usage

  • Allow the CIO to remotely erase sensitive data

  • Only CIO approved applications can be installed

  • Use a real time operating system (RTEMS) to monitor usage and to check for non-compliant applications

  • Invest in security storage and encrypted transmission tools

Know your providers

Make sure your provider is HIPAA certified to avoid non-compliant penalties and security risks. IT departments must protect corporate data by all means available, it has become a crucial issue.

The CIO is the one who decides, provides and approves the applications and services that can access the company's computer system. By regularly tracking services usage, CIOs can understand the employees needs. Cimpl has been working on that for some time now and has developed the Real-Time Mobile by Cimpl application to help you remotely manage your data at any moment. You can track and know where all your mobile devices are, wherever you are, and prevent unauthorized uses. Cimpl simply allows you to take back control.

For additional information, please contact us or click below!



Topics: BYOD, Policy Compliance, Wireless management, Mobile Devices, IT Assets, Provider, Data, Usage

Written by Caroline Le Brun

As a 16-year marketing veteran, Caroline’s experience extends across multiple industries. Since she joined Cimpl, her successful marketing campaigns have increased the company’s online and community presence, in addition to Cimpl’s footprint and appearances in new or traditional media (such as the Globe and Mail). Caroline is a specialist in communication and social media. She works closely with analysts to keep track of and adapt to the trends and changes in the industry of IT: Technology Expense management, IT cost optimization, Technology trends. Her leadership conducts Cimpl’s marketing team toward ever greater achievements. Caroline is also an exemplary citizen. Outside of work, she is involved in TEMIA, the Dorval Day Camp, and other community organizations. She has a Bachelor’s degree in Commerce from Concordia University and a Master Certificate in Integrated online Strategies from the University of San Francisco Intensive Development program.

Follow Us!

Customer Stories: Access now!

Subscribe to our Blog