Manage Learn to apply best practices and optimize your operations.

Mobile encryption practices to reduce security and compliance risks

We've searched our sister sites and uncovered some of the best mobile encryption techniques to ensure security and compliance and eliminate risk.

As mobile devices continue to revolutionize the workplace, IT departments are fine-tuning strategies to tackle risk and solidify security. With the potential exposure of private data looming, mobile encryption is becoming increasingly vital, whether a device is lost, stolen or hacked.

Across SearchCompliance's sister sites, we've found some of the top techniques for mobile encryption that have proved successful time and again. In these pieces, experts and practitioners educate and weigh in on what organizations have to lose if they don't make mobile security a priority. There may not be one magic fix for protecting sensitive data, but mobile encryption sure helps.

Understanding encryption for mobile devices

When mobile device policies are introduced in the workplace, a lost or stolen smartphone can wreak havoc on an organization's security paradigm. Mobile encryption can help, but the behind-the-scenes work associated with mobile data encryption can be complicated to the untrained eye. This tip explains the mobile encryption process in detail, including best practices for reducing security risks.  

Mobile data encryption techniques: What's the best fit?

You may know what it means to encrypt mobile data, but it's equally important for compliance-minded folks to note that there's no one-size-fits-all encryption technique to suit every IT department. Depending on device, policy and services, organizations must install practices that ensure secure systems that target any unique follies. This security tip explains how to make these determinations; a smooth transition to encrypting mobile data awaits.

More on mobile encryption and compliance

Encryption controls for compliance and privacy

Survey says: Mobile device protection for compliance and privacy

Modern mobile data security practices to quell IT anxieties

Once upon a time, the newly launched Apple iPhone included no form of encryption or IT management hooks. Today, that lack of security would cause major anxiety for any IT department. Times have changed, so what are the best modern practices for mobile data security? Whether it's the passcode, remote wipe or a mobile device management strategy, this article spells out security practices and supporting measures that reduce risk across many types of mobile devices.

NASA encrypts all data after a series of security breaches

Between April 2009 and April 2011, the National Aeronautics and Space Administration (NASA) reported the loss or theft of 48 of its mobile computing devices, putting the personal information of hundreds of thousands of employees, contractors and students at risk. NASA's response? Encrypt everything and keep all devices under the same roof. This case study confirms that even massive government agencies experience continuous security troubles, and reveals the steps they took in response.

Answers to your BYOD and mobile security questions

Bring your own device (BYOD) has taken the workplace by storm, revolutionizing the way organizations conduct business both inside and outside the office. As more and more mobile devices hold sensitive corporate data, IT administrators are pressed to increase security and decrease risk. Questions continue to arise, such as, "What are the costs?", "What products should we use?" and many more. We have the answers to your BYOD questions, and the research to help you build compliance harmony within your mobile program.

Dig Deeper on Encryption software solutions

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.