Essential Guide

Protect information like a pro: A guide for enterprise CIOs

A comprehensive collection of articles, videos and more, hand-picked by our editors

Data protection management in a mad, mobile world

Nothing gives IT headaches like MDM. Read what our Twitter followers had to say about developing a data protection management plan for mobile devices.

SearchCIO.com's mobility-themed tweet jam Feb. 27 touched on one of mobility's biggest issues: how to create a data protection management plan to ensure that information on mobile devices stays safe.

Enterprise mobility continues to evolve at a rapid pace, adding complexity thanks to areas such as application development, cloud computing and bring your own device (BYOD) trends. So @searchCIO asked our followers:

Tweet jam participants tackled the difficult topic of data protection management head-on, suggesting possible solutions like mobile device management (MDM) programs, data encryption and shifting the CIO focus from the device to the data:

As our tweet jam participants pointed out, there's no easy solution to guarantee perfect mobile data protection management. With that said, many of our followers (and it's not just the compliance guys) suggested that companies create solid security policies around mobile devices, and data in general:

Even after organizations craft and implement mobile data protection management policies, there's still more work to be done. Human costs can make a security policy seem like a waste of time if employees or users aren't on board:

When it comes to developing security strategies and data protection management programs in a brave new mobile world, SearchCIO.com tweet jam participants talked problems and solutions, but in the end agreed that there is no way to guarantee data security:

Is ensuring data protection a lost cause for CIOs? Are factors like human error, user device preferences and a lack of employee trust hindering security policy success? Let us know in the comments section below.

Read more about what SearchCIO.com tweet jam participants had to say about developing a security policy to guarantee mobile device data protection by searching the #CIOChat hashtag on Twitter. Follow @searchCIO on Twitter to be notified about upcoming Twitter conversations.

This was first published in March 2013

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

Protect information like a pro: A guide for enterprise CIOs
Related Discussions

Emily McLaughlin, Associate Site Editor asks:

What can CIOs do to guarantee data security in this brave new mobile world?

0  Responses So Far

Join the Discussion

1 comment

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close