Page 34 - Mobile Data Loss
P. 34

28    Mobile Data Loss


          personal cloud service, the file is first encrypted before being uploaded.
          If the file is then shared with another employee, the key escrow at their
          company allows the file to be downloaded and decrypted for the
          employee to access and use the document. But when the file is shared
          with a nonemployee, the file remains encrypted and unusable by the
          nonemployee. This is a nice compliment to a defense-in-depth mobile
          strategy and creates a great user-experience for mobile users.



          SUMMARY

          Threats will always exist and continue to evolve. Implementing a
          layered security approach is key to succeeding in your mobile security
          strategy. But success is not always about avoiding a breach altogether,
          but also being prepared to respond to it. A thorough incident response
          plan can mitigate data loss and prepare you for when a breach occurs.
          If your security team doesn’t have a mobile-specific incident response
          methodology, they should. Engage your team to ensure the vetted
          processes are in-place to response. Many times we’ve heard “it’s not a
          matter of if, but a matter of when”; be prepared. All of the recommen-
          dations outlined should also have a tie-in to your incident response
          plan. The countermeasures defined in the chapter should help in
          implementing your defense-in-depth mobile security strategy.
   29   30   31   32   33   34   35   36   37   38   39