New mobile data access points complicate data protection strategies

In a world gone mobile, new devices inherently create new data access points and muddle IT's information governance and data protection strategies.

The increased use of mobile technology for business matters has IT compliance and security departments in frenzy over safeguarding mobile data access points. Devices such as smartphones, tablets and wearables are constantly transmitting data -- and not just personal information, but confidential corporate data as well.

During SearchCompliance's February #GRCchat on Twitter, participants shared their thoughts on emerging mobile governance, risk and compliance (GRC) concerns as these technologies enter the workplace. @ITCompliance asked our followers:

SearchCompliance Site Editor Ben Cole kicked things off, alluding to data oversight issues:

Not only do mobile technologies create new access points for IT to control, but these devices are constantly on the move, making monitoring inherently more difficult. Employees transmit data via mobile devices from everywhere -- the workplace, on their commute, from their homes, while traveling.

The desire to control these mobile devices -- and control them now -- has IT professionals implementing -- and some might say forcing -- security and compliance changes for which their organizations might not be prepared:

When it comes to mobile technology, there just isn't enough emphasis on data management and security in most cases, said Raaj Joshi, a senior consultant at GRC services provider Integrc. His input triggered a number of responses:

More on mobile GRC

Mobile's influence on regulatory compliance mandates

E-discovery: Mobile- and cloud-related complications

Do you agree -- or is this a classic case of "What came first: the chicken or the egg?" Should IT organizations develop security strategies and then work mobile devices and applications into those strategies, or the other way around? What have you actually observed in the field? Please sound off in the comments section below.

To read the entire conversation from this tweet jam, search the discussion hashtag on Twitter. Join our next #GRCchat scheduled for Thursday, March 27 at 12 p.m. EST (topic TBA).

This was first published in February 2014
This Content Component encountered an error

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Emily McLaughlin asks:

How does mobile tech such as smartphones, tablets and wearables complicate data protection and info governance strategies?

0  Responses So Far

Join the Discussion

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close