Free Webcast: Four Ways To Improve Your Content Marketing Maturity – Learn More ›
Popular Today in Tech: All Popular Articles

Mobile Device: Lost and Found

Mobile & Apps

Mobile Device: Lost and Found image 273656 l srgb s glEvery day there are more than 200 phones left in New York cabs. In one year that adds up to 73,000 devices in just New York City alone. Extrapolate that phenomenon out to all the major metropolises across the globe and you are faced with a staggering statistic.

There are many reasons as to why they are left behind, from people in a hurry to people who party. In the end the ‘why’ doesn’t matter, the net result is the same – a lost device. For those who lost the device this is an inconvenience. However, if the phone is connected to your work network, it represents much more than an inconvenience. It is a security threat.

Increasingly our personal devices are making their way into the enterprise. Through Bring Your Own Device (BYOD) initiatives and employee demand, mobile computing is rapidly transforming the way work is done. But it is also changing the way sensitive corporate information must be secured and managed. From device management, to app management, to information management businesses are finding that they can quickly fall behind the security curve.

This first video short in the yearlong series puts a comical spin on losing a mobile device. For many organizations though this is no laughing matter. It is no longer an option for business to idly sit on the sidelines hoping nothing will happen. There are far too many benefits of a mobile workforce to miss out. However, these benefits must be met with equal precaution in protecting the corporate network, and more importantly, corporate data.

Organizations need to fold mobility into their IT strategy. Mobility must fit into the larger whole of productivity and protection. Mobility is no longer an add-on that is off to the side of ‘real work’. Conducting work on mobile devices will only grow more rapidly as the capabilities of devices and services increase.

Related Resources from B2C
» Free Webcast: Build Better Products by Identifying and Validating Your Riskiest Assumptions

But this must be done with a comprehensive security plan that is neither too restrictive not too permissive for employees. Lock it down too much and employees will find a way around. Leave it too open and you risk exposure. However, businesses who understand the possibilities presented by a mobile workforce and leverage them to their fullest will flourish far into the future.

What is your strategy for the future? Where does mobility fit in for your business? Are you prepared to tame the threats in order to reap the rewards?

This article originally appeared on The Guardian and was republished with permission.

Comments on this Article: 0

Add a Comment

Add a Comment:


Thank you for adding to the conversation!

Our comments are moderated. Your comment may not appear immediately.