Companies are going mobile—big time. And that means IT organizations need to be smart about mobile device policies and data security. A number of misconceptions and myths about mobile security are making IT decision-makers’ jobs more difficult than ever.
Here are the top five myths of mobile security, and why they make for bad policy. Be careful, believing these myths could hurt you!
Myth 1: Everyone needs full rights to all network-based data and services.
Wrong! An end user’s title or job function shouldn’t mean they have access to all applications and services—at least not all the time or under all circumstances.
Myth 2: Employees are savvy about proper use of mobile devices and can be trusted to avoid risks.
It’s true that many users are quite savvy about accessing data and applications using mobile devices. But that doesn’t mean they’re using smart security practices.
Myth 3: Data protection is a concern for company executives, not rank-and-file employees.
Unless a user’s personal mobile device is properly protected, it’s at risk of falling prey to malicious attacks that could compromise company data. That’s a compliance nightmare for executives and a problem for employee privacy!
Myth 4: BYOD compliance programs are unnecessarily rigid and inhibit user flexibility.
Nope! BYOD compliance mandates don’t have to be a burden on users. Well-established guidelines and automated mobile device management tools can save time and money, making users happier and more secure.
Myth 5: Encryption is a security issue, not an operational one.
Proper encryption should be regarded as an operational imperative for all users, not just a technical requirement for the IT team to worry about.
Want to know more about these myths, and how you can make the best decisions about your mobile security? Download our free whitepaper, Your Company Data, Their Personal Device: What Could Go Wrong?