Get the Flash Player to see this player.
DOMESTIC NEWS
Today's 04-28-2024
Caution to employees using smartphones, tablets work
Thursday, 03/10/2013 10:51

Many businesses in Vietnam to allow employees to use smartphones , tablets , laptops ... to tackle the job , access the intranet to increase labor productivity , creating flexible work environments . However, behind this trend exist many challenges related to data security , information management ...

Below is an analysis of technology experts Ba Quynh Nguyen - Director of Software , IBM Vietnam on this issue .


Ba Quynh Nguyen - Director of Software , IBM Vietnam . Photo: M.B
 
Effective, but " suspended " the risk of insecurity
 
Currently the trend itself allows employees to use personal mobile devices such as smartphones or tablet to access the intranet and Handling Cases of organizational documents ( referred to as BYOD - Bring your own device ) has widespread in Vietnam .
 
On the one hand , BYOD is boosted , helping organizations operate , saving investment costs and maintenance equipment , and encouraging staff to develop " mobile " productive , flexible working work anywhere, anytime .
 
However, BYOD is also posing major security risk . So , organizations and businesses to make new provisions to support and manage the use of mobile devices in BYOD program . For example, at IBM , employees may use personal mobile devices for work , such as BlackBerry or iPad to check email , schedule meetings ... but to create conditions to meet the security requirements and strict confidentiality .
 
More specifically , organizations , businesses need to recognize very clearly when employees connect their mobile devices to the corporate network and " merging " of business data with personal data , the should consider these devices as any other iT equipment company , with security methods , appropriate security .
 
If not , the device will be the weakness of the security , disclose the risk of business information channel receiver or become security risks , security infrastructure for IT and business resources business .
 
The fact that the IT department of many organizations and businesses are facing great challenges in security due to a number of mobile platforms such as BlackBerry mobile devices , iOS , Android and Windows security models different density . Except for BlackBerry , most mobile devices are platforms other consumer products , the lack of control technology enterprise -class security .
 
Together , the data of enterprises and individuals that exist on the same device will be very difficult to find a balance between the security of the enterprise with strict privacy of personal data . The application " illegal " ( unauthorized ) or non- support of business risk spreading malicious code affecting the business data stored on mobile devices .
 
In addition, the mobile devices can be lost , stolen , due to small size or portable . Every time you lose like that again comes with the risk to the organization's data .
 
Where is the appropriate direction for the business ?
 
According to IBM , the most important issue that organizations need to develop a rigorous strategy , policies and clear guidelines for a mobile environment brings enhanced security , focus on some key areas key , such as data and resources can be accessed from mobile devices , platform support , approach control comments ; best Practices from organizations , businesses around the world .
 
First of all , to define what data will be stored and processed on any type of mobile device , thereby determining what data needs to be protected , and protected to some degree . Some companies only allow the use of email , contacts and calendar meetings . A number of other firms allows access to a number of important applications such as enterprise ERP ( Enterprise Resource System ) or CRM ( Customer Relationship Management ) .
 
The different access levels require different levels of security . It should be noted that when business data from a high-security locations (eg database or data storage server - flie server ) to a confidential devices lower the risk the lost data will be higher than the opposite .
 
Organizations should also identify businesses allowed to use mobile platforms in an enterprise environment , and therefore , need to be managed and supported . The mobile platform has different security mechanisms , different security .
 
One other decisions that organizations need to consider is responsible for managing mobile security system or use existing IT team , or hire a team of security services mobile professional .
 
And finally , whether the mobile environment of the organization , how the enterprise should also develop policies and procedures based on best practices . The advantage is a number of best practices for desktop and laptop users can use the mobile devices , eg provision roles and responsibilities in the management and security devices ; Posted k the mobile devices in the system ; installing , configuring security applications on mobile devices , automatically updating security patches , and policy settings related to security , security ; periodically report the security status of the device ; employee training on security of mobile devices .
 
In general , to have a BYOD program effectively , employees need to understand , accept , and comply with all aspects of security policy , security related . Organizations can now explain why employees are so in terms of unit policy , if employees understand the starting point of the policy , they are less likely to violate more .
 
Conversely , if the organization's policies excessively demanding , employees tend to violate more like disable , uninstall security software , security or skip some steps to control access .

According to Nguyen Duc ( ICTnews )
By NLDO News

 
More

ESTABLISHED VSGIA
BUSINESS DIRECTORY
INTRODUCTION LETTER
Received email
Input code below
ADVERTISING
Online: 2
Visitors: 449082
Tel: +84-903842957
Best viewed with Ms IE7.0, Firefox 3.0 by resolution of 1280x800 or higher.