Page 12 - Mobile Data Loss
P. 12
6 Mobile Data Loss
to your security strategy’s success. It can be outlined in policies dis-
played when they register their device, as well as in a management app
with visual privacy through which they can view this anytime. Taken
from a company with a hugely successful mobile security program
“We do not want to see what you do, but make what you do safer.”
SUMMARY
In summary, an enterprise mobile security strategy should encompass
the User, Apps, Device, and Network. This goes beyond the device
and beyond EMM, and encompasses a holistic mobile security design.
In the next chapter we’ll dive deeper into the mobile threat landscape
and the impact of these threats on enterprise mobile data loss. This
will provide the basis for outlining countermeasures for existing threats
as well as future ones, and provide a baseline for protecting enterprise
mobile data.
It’s important to note that your enterprise mobile security strategy
will not become a dusty security policy meant to cover mobile
security for the next 10 years. Instead, your mobile enterprise security
strategy will develop into an iterative security framework that
requires analysis and refinement over time. The goal is a more
defensive approach to protect your enterprise data with the enhanced
security and features provided by mobile, and incorporate lessons
learned from the plethora of PC-related breaches of the last few
years. Mobile has introduced more secure options to protect your
enterprise data; features that adapt to the new world of data sharing.
The risks and threats may be evolving, but so are the counter-
measures. Welcome to the mobile era of security.