Mobile Security: Where is enterprise data safest?

Mobile Security: Where is enterprise data safest? Right on your mobile device.

Mobile Security: Where is enterprise data safest? Right on your mobile device.

There’s a great mobile security worry among IT managers, who believe that mobile devices are the easiest way enterprise data can be breached. But the facts say something very different, writes Galen Gruman, InfoWorld executive editor, in his SmartUser blog. He concludes, “There’s simply no evidence to support this fear. In fact, there’s solid evidence that says mobile devices are not a significant—or even moderate—risk factor.”

Gruman draws his conclusion from data compiled in the Identity Theft Resource Center’s database of personally identifying information breaches. He says that he hasn’t found any mobile-linked breaches in the database for several years, including in the most recent one,  the 2016 report.

What does show up, he says, are “Paper records, thumb drives, external hard drives, laptops, hacks into databases and storage systems, and successful phishing attempts.” Gruman adds: “None of the lost, stolen, or compromised devices were smartphones or tablets. That’s probably because encrypted devices need not be reported; they’re presumed safe. iPhones and iPads have long encrypted their contents, and professional-grade Android devices have done that in recent years. In both cases, a simple IT policy can enforce that encryption.”

Gruman also points out that cloud storage services that worry IT, such as Apple iCloud Drive, Box, Dropbox, Google Drive, and Microsoft OneDrive don’t show up in the report, either, although he adds that it’s possible that a lost, unencrypted laptop has been used to get to cloud data accessible to it. But still, he says, “we didn’t see cases of these popular cloud storage services as the specific vector of a data breach—despite frequent IT fears to the contrary.”

As for keeping mobile devices secure, he says that even though no breaches have been reported, it’s a good idea to use a mobile management tool to improve mobile security.

We recommend going even beyond that level of mobile security. You should use a security-conscious tool to build your mobile apps, so that security is baked right into it. With Alpha Anywhere, you can easily implement robust mobile app security to protect your sensitive data. With it, you can add a sophisticated application security system to your web or mobile app running on the Alpha Anywhere Application Server. It lets you track users, groups, and pages to make sure only authorized users see the appropriate data. And, you’ll be able to ensure that your data is only updated and modified by those users with the correct permissions by setting field-level access controls. The Alpha Anywhere security system tests every page and file request to authorize access so that you don’t need to write any code to control access to various resources.

For more details about Alpha Anywhere’s sophisticated, robust security, click here.

To learn 5 ways to boost mobile app security, click here.

For perspective on IoT mobile app security issues -- improving cars through connected app security, click here.
How to Set Your Mobile App Strategy for 2017
Build Mobile Apps Fast

About Author

Amy Groden-Morrison
Amy Groden-Morrison

Amy Groden-Morrison has served more than 15 years in marketing communications leadership roles at companies such as TIBCO Software, RSA Security and Ziff-Davis. Most recently she was responsible for developing marketing programs that helped achieve 30%+ annual growth rate for analytics products at a $1Bil, NASDAQ-listed business integration Software Company. Her past accomplishments include establishing the first co-branded technology program with CNN, launching an events company on the NYSE, rebranding a NASDAQ-listed company amid a crisis, and positioning and marketing a Boston-area startup for successful acquisition. Amy currently serves as a Healthbox Accelerator Program Mentor, Marketing Committee Lead for the MIT Enterprise Forum of Cambridge Launch Smart Clinics, and on the organizing team for Boston TechJam. She holds an MBA from Northeastern University.

Related Posts
Why DevOps May Be Hurting Your Company — And What You Can Do About It
Why DevOps May Be Hurting Your Company — And What You Can Do About It
Mobile Technology Trends for 2019: What You Need to Know
Mobile Technology Trends for 2019: What You Need to Know
6 Reasons why Companies are looking to Build
6 Reasons why Companies are looking to Build "industrial Strength Mobile apps for their "Stand-Up" Staff


Subscribe To Blog

Subscribe to Email Updates