By Peter Davey
Undoubtedly, the majority of your colleagues are carrying their personal mobile devices to the office these days. Suffice to say, these professionals are producing, storing and sending such important documents as RFPs, presentations and financial results on these devices. Without question, the BYOD (bring your own device) generation is here to stay.
Noted market research company, Gartner affirms this fact by predicting that in less than a handful of years (2020), 85 percent of all organizations will adopt BYOD in some way, shape or form. Aside from rank-and-file employees, such programs will encompass contractors.
Many CIOs and CISOs (chief information security officers) are putting in extra hours to insure and maintain the confidentially of such vital data as new product specs, investor presentations as well as the aforementioned RFPs.
As is often the case in unintended data leaks, a device’s unsecured hard drive is often the culprit. To significantly ease the burden and concern of your company’s IT staff, I highly recommend incorporating encrypted hard drives within your personnel’s mobile devices. With the increase in major security breaches at myriad Fortune 500 companies such as Sony, Target, Home Depot and Anthem, this added expense is one well worth taking to not only maintain your company’s reputation but more importantly, to ensure your customers’ personal data remains safe.
Through the development of its Self-Encrypting Drive (SED) – addressing the U.S. Federal Information Processing Standard 140-2 – Toshiba can help prevent such data intrusions from taking place. In attaining this ultra-strict validation, the company’s hard drives may be used in such tightly-regulated environments as financial institutions and government facilities.
Since BYOD environments have pretty much become the norm, safeguarding your company’s data by within your staff’s mobile devices is paramount. With stories of another data breach occurring on seemingly a weekly basis, it is vital that your company take the extra step to insure its information is protected.