Page 7 - Mobile Data Loss
P. 7
CHAPTER 1 1
Preparing for Generation Mobile
INTRODUCTION
The world is shifting to a mobile-first generation of mobile devices and
away from the personal computer. Its impact on our personal lives and
our workday is like no other phenomenon of computing history. This
phenomenon has brought about a huge shift in how we share and con-
sume information. It has also blended our personal life with our work
life. While some companies have attempted to strong arm the wave in
opposition, others have embraced mobile thereby allowing these com-
panies to offer solutions that meet the needs and the demand of
Generation Mobile.
This tidal wave of mobile devices has been impossible to stop.
Whether enterprises embrace them or not, users are accessing your
data with mobile devices and sharing it in countless ways, a phenome-
non known as Shadow IT. Controlling this data loss may at first
appear to be an impossible task. In many cases, users are bringing in
their own device and have full control of that device and the data on
it. Even those organizations that have issued corporate devices find
that in most cases users still find a way to use them for personal use,
commonly referred to as COPE (Corporate Owned Personally
Enabled).
This has ushered in a new generation of Enterprise IT, one that
embraces the value that mobile brings to the company and its business.
It’s about enablement, agility, disruption, speed, ease-of-use, and aban-
doning our old approaches to IT. But this doesn’t mean that security is
an afterthought. We must learn from the security flaws of the PC era,
embrace the enhanced security that mobile provides, and take our
enterprises securely into the next generation of computing—mobile
computing.
Mobile Data Loss. DOI: http://dx.doi.org/10.1016/B978-0-12-802864-3.00001-5
© 2016 Elsevier Inc. All rights reserved.