Caution to employees using smartphones, tablets work
Thursday, 03/10/2013 10:51
Many
businesses in Vietnam to allow employees to use smartphones , tablets ,
laptops ... to tackle the job , access the intranet to increase labor
productivity , creating flexible work environments . However, behind this trend exist many challenges related to data security , information management ...
Below is an analysis of technology experts Ba Quynh Nguyen - Director of Software , IBM Vietnam on this issue .
Ba Quynh Nguyen - Director of Software , IBM Vietnam . Photo: M.B
Effective, but " suspended " the risk of insecurity
Currently
the trend itself allows employees to use personal mobile devices such
as smartphones or tablet to access the intranet and Handling Cases of
organizational documents ( referred to as BYOD - Bring your own device )
has widespread in Vietnam .
On
the one hand , BYOD is boosted , helping organizations operate , saving
investment costs and maintenance equipment , and encouraging staff to
develop " mobile " productive , flexible working work anywhere, anytime .
However, BYOD is also posing major security risk . So , organizations and businesses to make new provisions to support and manage the use of mobile devices in BYOD program . For
example, at IBM , employees may use personal mobile devices for work ,
such as BlackBerry or iPad to check email , schedule meetings ... but to
create conditions to meet the security requirements and strict confidentiality .
More
specifically , organizations , businesses need to recognize very
clearly when employees connect their mobile devices to the corporate
network and " merging " of business data with personal data , the should consider these devices as any other iT equipment company , with security methods , appropriate security .
If
not , the device will be the weakness of the security , disclose the
risk of business information channel receiver or become security risks ,
security infrastructure for IT and business resources business .
The
fact that the IT department of many organizations and businesses are
facing great challenges in security due to a number of mobile platforms
such as BlackBerry mobile devices , iOS , Android and Windows security
models different density . Except
for BlackBerry , most mobile devices are platforms other consumer
products , the lack of control technology enterprise -class security .
Together
, the data of enterprises and individuals that exist on the same device
will be very difficult to find a balance between the security of the
enterprise with strict privacy of personal data . The
application " illegal " ( unauthorized ) or non- support of business
risk spreading malicious code affecting the business data stored on
mobile devices .
In addition, the mobile devices can be lost , stolen , due to small size or portable . Every time you lose like that again comes with the risk to the organization's data .
Where is the appropriate direction for the business ?
According
to IBM , the most important issue that organizations need to develop a
rigorous strategy , policies and clear guidelines for a mobile
environment brings enhanced security , focus on some key areas key
, such as data and resources can be accessed from mobile devices ,
platform support , approach control comments ; best Practices from
organizations , businesses around the world .
First
of all , to define what data will be stored and processed on any type
of mobile device , thereby determining what data needs to be protected ,
and protected to some degree . Some companies only allow the use of email , contacts and calendar meetings . A
number of other firms allows access to a number of important
applications such as enterprise ERP ( Enterprise Resource System ) or
CRM ( Customer Relationship Management ) .
The different access levels require different levels of security . It
should be noted that when business data from a high-security locations
(eg database or data storage server - flie server ) to a confidential
devices lower the risk the lost data will be higher than the opposite .
Organizations
should also identify businesses allowed to use mobile platforms in an
enterprise environment , and therefore , need to be managed and
supported . The mobile platform has different security mechanisms , different security .
One
other decisions that organizations need to consider is responsible for
managing mobile security system or use existing IT team , or hire a team
of security services mobile professional .
And
finally , whether the mobile environment of the organization , how the
enterprise should also develop policies and procedures based on best
practices . The
advantage is a number of best practices for desktop and laptop users
can use the mobile devices , eg provision roles and responsibilities in
the management and security devices ; Posted k the
mobile devices in the system ; installing , configuring security
applications on mobile devices , automatically updating security patches
, and policy settings related to security , security ; periodically report the security status of the device ; employee training on security of mobile devices .
In
general , to have a BYOD program effectively , employees need to
understand , accept , and comply with all aspects of security policy ,
security related . Organizations
can now explain why employees are so in terms of unit policy , if
employees understand the starting point of the policy , they are less
likely to violate more .
Conversely
, if the organization's policies excessively demanding , employees tend
to violate more like disable , uninstall security software , security
or skip some steps to control access .
According to Nguyen Duc ( ICTnews )
By NLDO News