Mobile devices offer powerful productivity, but there is also the risk of security breaches. Tech Pro Research's survey looks at the best practices for securing these devices.
Companies of all sizes and in every industry are implementing mobile applications because of the agility in business operations that mobile devices provide, yet the increased use of mobile computing also brings a new set of security risks that organizations must address.
These devices are used externally as well as internally within companies. With the amount of time that mobile device are used off premises, risks of device loss, data loss or security breaches escalate. So, too, does the risk of devices being misused by those who are both authorized and unauthorized to use them.
Tech Pro Research is conducting a survey to examine which mobile devices companies are using, and how they are securing those devices. Respondents will be able to request a free copy of the resulting research report when it publishes in July.
Going forward, companies will move beyond mobile devices and begin to implement Internet of Things (IoT) devices and applications that demand greater security on the edges where computing occurs. This is in contrast to the centralized network security model that companies have used in the past.
As mobile computing advances, IT will be called upon to safeguard equipment, data and applications that employees will be operating at any time and from anywhere. To accomplish this, IT must implement security systems for mobile and IoT applications that must be agile, robust and able to function within, at and beyond the edge of the enterprise network. Equally important will be aggressive policy development and training of employees, who can often be a leading source of mobile computing security abuse.