Mobile Security

When It Comes to Mobile Security, How Much Is Enough?- Case Study
By Jason Hardy | March 21st, 2016

How do we protect the mobile enterprise?

How much security do we need?

IBM Mobile Security Framework­ - A guide for companies to use when developing their mobile security strategy including topics such as threat vectors and solutions.

According to Tyler Shields, the right amount of security depends on what you want to protect and why. For example, end user information and proprietary company information.

End user information: ­ External to the business→ client information like
 * Internal personnel  ­
 * Social Security numbers
 * Salary and benefits information
 * Performance reviews
 * Home addresses and personal contact information
 * ­Patient medical information
 * Financial information for billing and credit use
 * Contact information
 * Other confidential information

“There is an expectation from end users that their data will be protected and kept confidential.”

Some data is easy to value and therefore easier to define what security it requires. In other cases, such as “protecting data as part of a trust relationship in which failure adversely impacts the reputation of the enterprise” are harder to determine and quantify.

What Data Needs to Be Protected?
Protecting proprietary company data:How do companies fulfill the demand for access to data without compromising its security? End users expect a similar experience of accessing data on their mobile devices as they do through using the web.

The Bottom Line
“Mobile security doesn’t have to be bulletproof. It just has to be good enough to frustrate and deter cyber criminals so they go looking elsewhere for an easier target.”

Related Pages
Encryption

Privacy Breach