This content is part of the Essential Guide: Protect information like a pro: A guide for enterprise CIOs
Problem solve Get help with specific problems with your technologies, process and projects.

Data protection management in a mad, mobile world

Nothing gives IT headaches like MDM. Read what our Twitter followers had to say about developing a data protection management plan for mobile devices.'s mobility-themed tweet jam Feb. 27 touched on one of mobility's biggest issues: how to create a data protection management plan to ensure that information on mobile devices stays safe.

Enterprise mobility continues to evolve at a rapid pace, adding complexity thanks to areas such as application development, cloud computing and bring your own device (BYOD) trends. So @searchCIO asked our followers:

Tweet jam participants tackled the difficult topic of data protection management head-on, suggesting possible solutions like mobile device management (MDM) programs, data encryption and shifting the CIO focus from the device to the data:

As our tweet jam participants pointed out, there's no easy solution to guarantee perfect mobile data protection management. With that said, many of our followers (and it's not just the compliance guys) suggested that companies create solid security policies around mobile devices, and data in general:

Even after organizations craft and implement mobile data protection management policies, there's still more work to be done. Human costs can make a security policy seem like a waste of time if employees or users aren't on board:

When it comes to developing security strategies and data protection management programs in a brave new mobile world, tweet jam participants talked problems and solutions, but in the end agreed that there is no way to guarantee data security:

Is ensuring data protection a lost cause for CIOs? Are factors like human error, user device preferences and a lack of employee trust hindering security policy success? Let us know in the comments section below.

Read more about what tweet jam participants had to say about developing a security policy to guarantee mobile device data protection by searching the #CIOChat hashtag on Twitter. Follow @searchCIO on Twitter to be notified about upcoming Twitter conversations.

Dig Deeper on Enterprise data privacy management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.