Data protection management in a mad, mobile world

Emily McLaughlin, Associate Site Editor

SearchCIO.com's mobility-themed tweet jam Feb. 27 touched on one of mobility's biggest issues: how to create a data protection management plan to ensure that information on mobile devices stays safe.

Enterprise mobility continues to evolve at a rapid pace, adding complexity thanks to areas such as application development, cloud computing and bring your own device (BYOD) trends. So @searchCIO asked our followers:

Tweet jam participants tackled the difficult topic of data protection management head-on, suggesting possible solutions like mobile device management (MDM) programs, data encryption and shifting the CIO focus from the device to the data:

As our tweet jam participants pointed out, there's no easy solution to guarantee perfect mobile data protection management. With that said, many of our followers (and it's not just the compliance guys) suggested that companies create solid security policies around mobile devices, and data in general:

Even after organizations craft and implement mobile data protection management policies, there's still more work to be done. Human costs can make a security policy seem like a waste of time if employees or users aren't on board:

When it comes to developing security strategies and data protection management programs in a brave new mobile world, SearchCIO.com tweet jam participants talked problems and solutions, but in the end agreed that there is no way to guarantee data security:

Is ensuring data protection a lost cause for CIOs? Are factors like human error, user device preferences and a lack of employee trust hindering security policy success? Let us know in the comments section below.

Read more about what SearchCIO.com tweet jam participants had to say about developing a security policy to guarantee mobile device data protection by searching the #CIOChat hashtag on Twitter. Follow @searchCIO on Twitter to be notified about upcoming Twitter conversations.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Expert Discussion

Your turn: What can CIOs do to guarantee data security in this brave new mobile world?

Emily McLaughlin, Assistant Site Editor
What's your opinion?
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest