Mobile Device Security Risks for BYOD Businesses - Implement Responsible Mobile Recycling









Business professionals have come to depend on their mobile phones, tablets and devices as part of their everyday lives. However, according to a recent study, the majority of users are concerned about the mobile security on these devices and confused where they should be looking for help when security incidents arise.

In March 2012, Juniper Networks' first annual Mobility Index mandated 4,037 mobile device users and IT decision-makers in the United States, United Kingdom, Germany, China and Japan. The study reveals that most mobile users remain skeptical about the safety of their devices and the applications they utilize. According to this study, 63 percent of users are not sure if they should trust that their mobile experiences are secure.

The Bring Your Own Device trend gaining in popularity and because of this IT professionals reported data security breaches on unsanctioned devices as their number one concern. In fact, more than 40 percent of those surveyed indicated that they use personal devices for work without official permission. With nearly one-third of IT professionals reporting that their organization experienced a data security break as a result of a personal device accessing company data, enterprises need to begin considering mobile security a serious issue.

According to the survey, 63 percent of users hold their service providers responsible for the safety of their private data. The remaining individuals surveyed depend on the device manufacturers and software service providers. However, all parties have a part to play in preventing mobile security breaches. Users have a responsibility to find out what applications they are using and if they are safe. They also need to protect the data on their phone with password protection or remote wiping capabilities in the case of theft. Business owners also have a responsibility to put in place a mobile security plan that will protect their employees as well as the company's confidential data.

To avoid giving cybercriminals the chance to hack into corporate networks, enterprises need to address the issues of mobile security and develop a plan to combat these issues. As more people rely on mobile applications, services and networks to handle critical personal and business information, individual users need to educate themselves on the consequences of mobile security while companies need to develop a comprehensive solution that will protect their sensitive corporate data.

An important consideration often overlooked in protecting sensitive mobile data is the responsible reuse and recycling of used devices once they are replaced with a newer technology. Many BYOD enterprises provide employee stipends to purchase their preferred mobile phone or tablet for business use, however they do not have procedures in place to ensure the data on used devices is protected once discarded.

In a recent study, Electronic Retention : What Does Your Mobile Phone Reveal About You ?, researchers in the UK investigated the amount to which sensitive information resides on mobile phones after users attempt to remove the information. For the study, 49 re-sold mobile devices were admitted from secondary markets and examined using mobile forensic toolkits. Every device yielded some user information and 11,135 pieces of information were recovered, confirming that temporary personal information is retained on a typical mobile device.

Without a clear mobile recycling policy in place, employees are free to sell the used devices on eBay, Craiglist or online mobile buyback companies that offer little or no data protection guarantees. Additionally, it is essential for a BYOD organization to establish a partnership with a trusted mobile asset recovery and recycling vendor that offers proven, documented mobile data cancellation methods and require their work to only resell and recycle their used mobile devices through this partner.

Enterprises that establish a secure mobile recycling program will not only benefit financially by recouping the remaining resale value of used mobile devices, but also ensure that their sensitive data does not end up in the wrong hands. For a list of certified electronics recyclers with valid data deletion processes, visit http://e-Stewards.org .









0 comments

  • Computer Engineering in College Technology is an ever-changing force that will provide the jobs of the future. Every day technology is advancing and transforming to meet the growing needs of the world. The most useful lessons to earn now are the ones that will propel…
  • Auto Repair Manuals If you are an amateur auto mechanic who loves to dig in the car engines until the wee hours while most people are under their blankets, entails the spirit of the "do-it-yourself" -doer and are not afraid to get grease on your hands or if…
  • How to Replace a Power Window Regulator and Motor AssemblyWhen one of the power windows in your vehicle fails to function, it may be the result of a broken window regulator. If you have identified the motor as the issue, then replacing a power window motor is simple. We recommended that you review a…
  • Do Video Games Damage Our Brains? If you play video games frequently, your brain changes - the more of the so-called gray mass is present in the hippocampus of the brain, the healthier the thought organ is. The less of them are present, the higher the risk of developing a brain…
  • Computer Game GenresPeople who play computer games learn the type (genre) that interests them. Then, they cull through choices that fit the genre before they purchase. But, a person who wishes to give a computer game to a family member or friend may want to observe the…