Ready to Secure Your Mobile Network?

Companies need to adjust to doing business in a mobile world. And extending your network to mobile devices can raise serious risks of data leakage or theft.


24 June 2014

Mobile security

As we noted in our previous blog, it’s obvious that companies need to adjust to doing business in a world full of consumer tablets, smart phones, and other devices. And extending your enterprise network to mobile devices can raise serious risks of data leakage or theft.

There is a growing assumption that any business device can also double as a personal machine. But this mindset has implications that information technology (IT) and business managers must face.

Even the most lax Bring Your Own Device (BYOD) policy can take small steps to protect its data. One such move is rolling out a secure mobile app — so let’s think about that for a moment.

Technology Checklist

Your data is valuable and you must have a process in place that gives you control over it. Remember to strike a balance that preserves the freedom of your workers’ needs to collaborate freely — but without compromising security. An enterprise-grade mobile app can work best when you have:

  • Protection that lives with your information everywhere, even if the device carrying the data is lost
  • Standardized encryption with a military-grade key
  • App developers who can leverage existing encryption engines
  • Server authentication, with a combination of passcodes and timeouts for access
  • The ability to provision internal and external users — as well as the ability to revoke provisions, as needed

Consumer Devices, Corporate Data

You must start thinking not only about specific technologies (although this is necessary), but also about your underlying processes. So consider how the following can help you:

  • A risk management assessment. Create a risk management plan. Keep in mind it requires an understanding of regulation and certifications, as well as expertise in handling risks and ensuring compliance.
  • A network inventory. When hardening your infrastructure, don’t forget it’s best to leverage current IT resources to ease adoption. For that, you’ll need to figure out what integration capabilities you need for your existing applications and protocols.
  • Extended enterprise security. Always remember, access control and monitoring should be just as robust on mobile as it is in your enterprise.

The ever-expanding universe of mobile computing offers companies competitive advantages. But businesses must realize there are liabilities involved: The smartest companies will extend their networks only where it’s safe. It really is up to you to secure your mobile network.



Meagan Parrish

Meagan Parrish

Meagan Parrish is the Senior Manager of Social Media at Intralinks. She is responsible for social media strategy development and the communications for Intralinks' online communities. Meagan has been creating social media strategies for a variety of companies across verticals for the past several years. She holds Bachelor degrees in Marketing and Finance, with a minor in English Literature.