Mobility and Social Media: Embrace and Respond
Embrace and respond to mobility, social media trends
It will behoove you and your organization to recognize that mobility and social media are here to stay. Instead of banning mobile devices and social networking sites at work, you can mitigate the risks by simultaneously taking steps to safeguard your company's most critical access points and information assets, while creating a culture of risk awareness and compliance. The first step is to identify the key access points that must be secured. These will most likely be associated with access to primary information assets such as intellectual property, customer lists or corporate email traffic. Once these are identified, you can implement a data leakage prevention program. On the process front, your organization should make a distinction between what is available on mobile devices versus what can be accessed from a secure location. The right people should be permitted to obtain the data they need where and when they need it without unnecessarily exposing themselves to any data risk.
Next, access to sensitive data, mobile or otherwise, should be restricted on a "need to access" basis. You'll want to establish protocols requiring that data stewards be notified of access to critical data. In terms of your people, those with access to sensitive information should be well briefed about the reasons data security is essential, as well as educated about the basics, such as safeguarding and regularly updating passwords. Implement processes to develop awareness and ensure compliance with security requirements.
The Role of Standards in Cloud Security
Security is often cited as a primary cause for concern...Watch Now
Ensuring Resources for Mission Critical Workloads
Application workloads can thrive in cloud environments,...Watch Now
Improving Security in the Public Cloud
One of the main concerns about moving data to a public...Watch Now