Every organization is a little different. In order to determine what your mobile risks are, first look at how your employees are using their mobile devices. What are their roles? What information can they access? And what is your current mobility policy?
Once you have looked at you mobile landscape, you’ll want to create a role-based policy that incorporates the key use cases for each user type.
For example, since sales people and support people have access to customer data, you’ll want to set policies for data removal, storage and access to ensure the data doesn’t get sent to personal accounts or stored in a public cloud. For contractors, you may want to limit device usage to work apps only. For other employees, you may only need to lock or wipe a device if it’s is lost.
Here are a few helpful resources:
- Tips on setting up a mobility policy
- How employee adherence to mobility policy impacts effectiveness
- Case study on a customer who limited device usage to work approved apps only
If you want to learn more about determining the appropriate security level for your organization, attend our webinar on May 21: A Three Pronged Approach to Mobile Security. Let us know your questions – post to Twitter with the hashtag #3ProngSecurity or leave a comment on this post.