Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Battling to Secure Your Mobile Workforce?

Battling to Secure Your Mobile Workforce?

by MaaS360 staff | December 07, 2011

Did you know that around 45% of the mobile workforce has a job that is compatible with a certain amount of mobile commuting? Wow!

Telecommuting is slowly turning into a motivating factor for employees to stick with their company. While the employee benefits from flexible work hours, improved productivity and better work-life balance, the employer benefits from easy and anytime reach to his employees. These benefits of this win-win situation make the distance between co-workers less significant, and work as an effective retention strategy for the employer (as this CNBC report explains).

Needless to say, laptops, iPhones, Androids and tablets (iPads in particular) are the biggest enablers for the change in this working trend. Today's mobile workforce is made up of individuals who own multiple devices. They use each one differently in their daily processes such as communicating, scheduling, and storing data. In response, mobile IT administrators are looking for ways to control the types of devices accessing corporate information, impose penalty actions for human errors (lost, stolen, damaged devices), and prevent lingering mobile malware threats from penetrating their network.

Securing a given body of mobile workers can be a challenging task, and the challenges multiply when workers demand ubiquitous access to information on any device. Rather than imposing restrictions on devices or type of information accessed, IT administrators can implement the following steps to manage and secure their mobile workforce:

  1. Enforce strong password policies on all devices. You may use a mobile device management (MDM) solution to impose password policies and quarantine actions when the maximum number of password attempts has been exceeded.
  2. Maintain visibility and control across all your devices and their applications
  3. Ensure the healthy state of all your devices to avoid any malware infestations. Educate users (via email, alerts, notifications) about the upcoming patches for different mobile operating systems and any mobile malwae making the rounds. Encourage your users to install multiple anti-virus products to keep their devices away from any spam or Trojans.
  4. Ensure that no consumer apps or malicious apps are accessing any corporate data. Use a mobile application management (MAM) solution to keep an eye on apps and their behavior. With a MAM solution, you can set rules for accessing corporate data only on a secured tunnel.
  5. Keep an eye on any lost, stolen, or damaged devices. Using an MDM solution, you can set flags or notifications for any lost or stolen devices. If required, you may also define auto-quarantine actions.
  6. Identify rogue devices and restrict them to avoid any interference with corporate security.
  7. Ensure 24/7 support for your mobile workers. They should have help available to avoid any business downtime.
  8. Consider creating a sandbox for testing new technologies in different environments. These can remain until they are deemed ready for the mobile workers.
Are there any other challenges you face that you would like to discuss? Feel free to share below. We'd love to hear from you and help where we can.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

Free Webinars

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    The Internet of Things and the consumerization of IT bit.ly/1tI9CkD
  • MaaS360 MaaS360 by IBM
    Live online training in 30 mins: Setting Up Your MaaS360 Portal bit.ly/1vvbr4i
  • MaaS360 MaaS360 by IBM
    Spending on Consumer Electronics and Midsize IT to Break Records bit.ly/1uzco6i

Most Active Users

vhetrick
2014_08_14
jharrington
Joe Pappano
KaylaBittne...
bcampbell
Donna Lima
jwittkopp
manthony
Kumar A
Giovanni
CitizenSane
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.