Mobile Devices: Challenges They Produce At Work Without IT Solutions

Mobile DevicesAs any IT manager knows, policies that instruct employees how to interact with technology will never be followed with 100 percent compliance.  Sometimes, in fact, such policies cannot be perfectly followed since technology itself may take some of the decision-making out of the hands of individual employees.  

The presence of sensitive information on mobile phones and other personal devices is a case in point.  Some businesses have adopted policies that ban the use of such devices to store any sensitive data, including customer information and proprietary IT solutions and plans.  Even employees trying their best to follow the directive, however, may end up contravening it.  All it takes is for a user to open an email on his or her mobile phone.  Should that email contain sensitive information, the user will be in violation of the policy.  Yet the individual user cannot always know in advance that an email is going to mention something of a sensitive nature.

For this reason, many businesses are moving to a model that incorporates widespread encryption of mobile devices.  This model is often implemented with a managed programs approach in which visiting staff from an IT company provides essential and timely services on a scheduled basis.  Such staff will possess the expertise to work with a great many different mobile devices so that proprietary company data can be protected no matter where it resides.  Firms that already use a managed programs model should consider inquiring about adding mobile encryption as a responsibility for the staff scheduled to visit them.

Whitepaper: 6 Do’s & Dont’s for Choosing the Right IT Service Provider