Twitter Facebook LinkedIn Flipboard 0 Salacious headlines around security breaches continue to dominate the media. Capped by recent high-profile attacks on household brands, it seems there is no end in sight for this type of cyber attack threatening corporate embarrassment and consumer concern. Recent hacks have been simple but have demonstrated the damage and impact extortion via email or payroll data can have on an organisation. It is unsurprising that concerns over the vulnerability of personal information are heightened. Device manufacturers have experienced a backlash from its users, calling for stronger security measures. This news followed a string of security breaches and news that the Information Commissioner’s Office (ICO) resolved 15,492 data protection complaints according to a recent report – a rise of over 10 per cent on the previous financial year, and a record number to date. Last summer, former National Security Agency (NSA) contractor Edward Snowden singled out Dropbox for being “hostile to privacy”. He claimed the cloud-storage provider lacked the security measures to protect users against government snooping because it controls the encryption keys – meaning it’s capable of sharing data stored on its servers with the government. This said, we’ve seen a transformation occur over the past several years, where manufacturers have delivered world-class consumer products, providing users with more power and freedom to share information than they have ever had before on mobile devices, unfortunately this also means potentially syncing corporate data to consumer outlets (i.e. Sync corporate content to iCloud, Facebook, LinkedIn, etc.) In direct conflict with this is enterprise security teams are struggling to keep pace with how to use basic MDM products to control the innovative and powerful consumer functionality for work-related activities. There’s no question. We are living in the era of data – both in an individual and corporate capacity. We can also increasingly access it from anywhere thanks to mobile devices. Users and businesses alike want to feel as though someone is protecting this information – a ‘data fairy Godmother’. The continued headlines around security breaches shine a spotlight on the fact that data security is still taking a back seat. What’s clear is that there is an ever present need to promote greater security awareness. From a business perspective, too often IT departments looking to deploy BYOD in their organisations use legacy Mobile Device Management (MDM) technology so employees can access files and work remotely on smart devices. This simply manages the device – business and personal data isn’t differentiated between, and there’s nothing keeping the private data secure. With this, we enter the murky waters of employers having access to employees’ personal communications, apps, pictures… the lot. It seems a big ‘cost’ to pay to be able to use their preferred mobile device at work. Who would really be surprised if employee privacy was the next big corporate scandal? Of course, businesses have their data to think about too. News sources frequently carry stories about data leaks – these can be costly to businesses on both a financial and reputational level. But that doesn’t mean companies should ask employees to surrender their mobile device and everything on it in an attempt to safeguard corporate data. When corporate and personal assets need to be protected, businesses need to look to a security solution that is capable of both. A containerisation approach is a simple answer – corporate data is stored in a secure container, entirely separate to the device owner’s personal content. Twitter Tweet Facebook Share Email This article was written for Business 2 Community by Kane Pepi.Learn how to publish your content on B2C Author: Kane Pepi <p>Kane Pepi is an experienced financial and cryptocurrency writer with over 2,000+ published articles, guides, and market insights in the public domain. Expert niche subjects include asset valuation and analysis, portfolio management, and the prevention of financial crime. Kane is particularly skilled in explaining complex financial topics in a user-friendlyView full profile ›More by this author:VoIP Basics: Everything Beginners Should Know!Bitcoin Investment, Trading & Mining: The Ultimate Guide for BeginnersIs This a Better Way to Set Your 2020 Goals and Resolutions?