03/08/2016

This is the Biggest Privacy Battle in Decades

by ZixCorp

Posts

And it’s happening all thanks to an outdated mobile device policy.

Smartphones aren’t simply just another technological convenience; containing vast amounts of data, they provide an intimate look into our personal lives  and likely hold plenty of information related to our jobs and employers.

As mobile devices have flooded the workplace, employees have become better equipped to perform work functions away from their desktop computers. And if you work in IT, these devices often represent a headache.

It’s the responsibility of the IT department (as well as management) to set a mobile device policy that will define how employees will safely use mobile devices for work. Unfortunately, creating a mobile device policy can be tricky — there are no one-size fits all solutions.

While there are multiple options (and we certainly have plenty of thoughts on the proper way to do this), not implementing and enforcing a policy is the worst option, as San Bernardino County demonstrates in a very public manner.

Reuters reports that San Bernardino County requires, some, but not all, of its workers to install mobile device management (MDM) software on government-issued phones. In what seems to be an absolute worst-case scenario, this MDM software was not installed on the San Bernardino shooter’s iPhone, because his department was not required to use it.

The bigger issue at hand is that San Bernardino County was relying on a mobile device policy that was written in 2004 (before the advent of smartphones, mind you). If the phone in question did have the proper software installed on the phone, the high stakes legal battle that has pitted Apple (and much of the technology industry) against the U.S. government could have been avoided altogether.

With that in mind, the County of San Bernardino’s failure to properly manage its corporate-owned devices through widely available solutions is why this current predicament is the subject of so much debate.

Regardless of what mobile device policy your organization chooses, at the very least make sure it’s up to date and enforced across the entire organization.

Posted: 3/8/2016 12:00:00 AM by Global Administrator | with 0 comments
Filed under: Data, device, management, mobile, Privacy, smartphones


Recent Posts

11/21/2017

The Best Defense is Good Offense When Protecting Your Inboxes

View Blog Post

11/14/2017

How to Spot BEC Attacks and Best Limit Their Success

by Guest Blogger Michael Osterman

View Blog Post

11/01/2017

Why Google’s Transparency Report Reveals Only the First Step Toward Email Security

by Geoff Bibby

View Blog Post