Page 37 - IEC Insights Jul-Aug19
P. 37

ow many devices have access   receiving malware directly through a   a “real quick check” of work email from a
                     to your company network and   text message. In those cases, anything   personal laptop that hasn’t been properly
                     data? Be sure to include not   that employee had access to is now   secured can expose the company to risks.
                     just the computers plugged   open to anyone else, and worse yet,
           Hin at the office, but also the     sophisticated attacks can also use “lateral   Additionally, there is a risk of crossover
            laptops, smartphones, smartwatches   movement” to snake through your   between company and personal
            and anything else that’s been signed in   enterprise systems to gain even higher   information on employee devices.
            to your WiFi or has access to company   levels of access — eventually getting   Without isolation between company
            email — even those that can remote-  the executive-level keys to the castle.  and personal data, employees could lose
            access from home. If you’re unsure of                                both if a device is mistakenly reported
            that number or what those devices might   And while you may think that you don’t   missing and subsequently wiped. Legal
            be, your data might already be at risk.  have information valuable enough for   ownership of company information could
                                               someone to steal, it doesn’t always   also come into question if it’s stored
            Theft, data corruption and breaches don’t   have to be social security or credit card   on an employee’s personal device.
            just occur at massive companies —    numbers they target. If any information
            anything or anyone can be a target.   is valuable to you or your company,
            Contractors can no longer ignore data   someone can try to make you pay to get   MOBILE APPLICATION
            security and need to establish a mobility   it back. Even if no personal information   MANAGEMENT
            management strategy — a system of   is stolen, an attacker could threaten to
            procedures and policies to regulate who,   corrupt or destroy all of your payroll   As a result of the changing mobility
            where and how their company data can    data unless you pay their ransom.  and remote-connectivity of users, MAM,
            be accessed — to protect their businesses.                           or mobile application management,
                                               With the extent of mobile devices   strategies emerged. Rather than securing
                                               throughout a workspace being so difficult   each individual device like MDM, MAM
            ASSESSING                          to control, simply stating that personal   applies additional security to individual
            THE THREAT                         devices can’t be used at work isn’t extensive   applications. For example, while an
                                               enough as a security strategy. Contractors   employee might use one email app for
            According to JBKnowledge’s 2018    need to take proactive measures to secure   personal use, the employer may allow
            Construction Technology Report, over   their sensitive data by incorporating   them to access work emails only through
            one-third of contractors don’t secure   layers of mobility management.  a specific app that they can encrypt
            employees’ personal devices used for                                 and control at an enterprise level.
            work, while another third claim to not
            allow employees to use their personal   MOBILE DEVICE                With MAM, companies can maintain
            devices at all. Regardless of whether or   MANAGEMENT                control over their enterprise apps on
            not contractors have an official BYOD                                an employee’s device without intruding
            (“bring your own device”) policy where   MDM, or mobile device management,   upon personal information. This is
            workers use their personal devices for   aims to secure the individual tablet,   called “containerization.” Much like
            work-related matters, mobile devices   smartphone, laptop, etc. being used to   plastic storage containers in your fridge
            continuously flow throughout workplaces   access anything work-related. Through the   that might contain different meals for
            and their networks. And if those devices   use of device encryption, PIN access, and   the week, containerization works to
            are allowed to access any sources that   remote wiping of the device in the event   separate and isolate company data from
            even indirectly touch company data,   of loss or theft, MDM provides companies   personal data on an employee’s device,
            they could present risks to that data.  with a system for controlling each device   preventing any interaction between the
                                               an employee uses for conducting business.  two. With containerization, employees
            For businesses, these unsecured devices                              can maintain privacy with non-enterprise
            can become points of vulnerability for   While MDM is a great step in securing   applications since companies can’t access
            the entire company network, opening up   business data, there are some limitations.   the employee’s personal container while
            possibilities for data theft or corruption.   With cloud-based storage and access,   companies can still monitor and encrypt
            It may seem obvious that a lost or stolen   employees can now reach company   any activity occurring on enterprise
            device with saved credentials — like   information from any device at any time.   apps within their company container.
            autofilling a username and password —   With only an MDM strategy in place,
            can provide an all-access gateway into   a company must account for each of   Through MAM, companies can designate
            company information, but any device   these devices and ensure proper security   which applications have access to
            can also compromise company data by   guidelines are being followed by each   company data and remotely wipe
            connecting to an unsecured public WiFi   employee and on every device that is used   information from enterprise apps, leaving
            network, clicking on an email scam or   for any business-related activity. Even just   the user’s personal data untouched.




                                                                       www.ieci.org  |  July/August 2019  |  Insights Magazine  35
   32   33   34   35   36   37   38   39   40   41   42