Page 48 - Mobile Data Loss
P. 48

42    Mobile Data Loss

































          Figure 5.1 Mobile Data Loss Threats & Countermeasures Flow.


          very similar approach to mitigating data loss. The following diagram
          outlines the flow (Figure 5.1):

             This diagram leverages many automated controls that include a
          Secure Mobile Gateway or Network Access Control that, from a net-
          work perspective, control access to resources including email, content
          repositories, intranet websites, and application servers.

             More and more organizations are also embracing the cloud. EMM
          can also provide integrations with cloud services to blacklist a mobile
          device and/or user to prevent further access. Additionally, the selective
          wipe locally on the device can remove the downloaded cloud data and
          credentials, thus revoking access.



          MOBILE DLP METHODOLOGY

          I’ve covered a lot threats and countermeasures in this book. With the
          mobile threat landscape evolving so quickly it’s important to assemble
          an actionable methodology to securing mobile devices, apps, content,
   43   44   45   46   47   48   49