#3ProngSecurity: Q2 – What level of security do I need to offset my mobile risk?

We posted the first question earlier this week for our upcoming webinar, and here is our second: what level of security do I need to offset my mobile risk?

3pronghashtag

Every organization is a little different. In order to determine what your mobile risks are, first look at how your employees are using their mobile devices. What are their roles? What information can they access? And what is your current mobility policy?

Once you have looked at you mobile landscape, you’ll want to create a role-based policy that incorporates the key use cases for each user type.

For example, since sales people and support people have access to customer data, you’ll want to set policies for data removal, storage and access to ensure the data doesn’t get sent to personal accounts or stored in a public cloud. For contractors, you may want to limit device usage to work apps only. For other employees, you may only need to lock or wipe a device if it’s is lost.

Here are a few helpful resources:

If you want to learn more about determining the appropriate security level for your organization, attend our webinar on May 21: A Three Pronged Approach to Mobile Security. Let us know your questions – post to Twitter with the hashtag #3ProngSecurity or leave a comment on this post.


Webinar Details

Topic: Three-Pronged Approach to Mobile Security
DateMay 21
Time11 AM PST

 

2 thoughts on “#3ProngSecurity: Q2 – What level of security do I need to offset my mobile risk?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s