Page 43 - Mobile Data Loss
P. 43

CHAPTER 5 5






            Developing Your Mobile Device
            Security Strategy




            When developing a mobile device security strategy one should embrace
            both security and the users. Without embracing the users and making
            security as invisible as possible, users may become frustrated and
            abandon the solution. Additionally, it may cause “Shadow IT” causing
            users to find ways to bypass security controls. This is a different mindset
            to traditional security approaches, and should be incorporated into any
            mobile security deployment to ensure success. It’s not about restrictions,
            but about enablement.



            PROACTIVE CONTROLS
            Any holistic security strategy should include proactive, reactive, and live
            monitoring controls. Proactive controls should protect the data-at-rest
            and the data-in-motion. Fundamentally, a device PIN/Password and
            encryption are important, but for a security conscious organization,
            further DLP controls are required. For example, if a user receives a
            corporate email with an attachment, there’s nothing preventing an
            employee from opening the attachment and uploading it to a cloud
            service, sharing it with nonemployees, and more. This is where separa-
            tion of personal and enterprise data becomes important.
               An encrypted container for enterprise data provides proactive
            protections from the personal persona on the device to avoid comin-
            gling of the data and data loss of enterprise data. Through both
            encryption and DLP controls, the organization can control enterprise
            data, while leaving the user’s personal data alone. This will provide
            protections against accidental or intentional sharing of enterprise data
            with cloud services, other email accounts, copy/paste, screenshot, and
            more. Additionally, this container provides a level of protection
            against malware downloaded outside the container, as the container is
            encrypted and controlled separately from the rest of the device. While

            Mobile Data Loss. DOI: http://dx.doi.org/10.1016/B978-0-12-802864-3.00005-2
            © 2016 Elsevier Inc. All rights reserved.
   38   39   40   41   42   43   44   45   46   47   48