FEBRUARY 28, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Hitting the Data Jackpot

Security for Home Users
Protecting Your Mobile Privacy

Security for Business
Preparing for BYOD in 2014: Enabling Your Mobile Workforce



Security for Business

Preparing for BYOD in 2014: Enabling Your Mobile Workforce

Security tops the list of BYOD challenges for any network administrator, which often prevents businesses from adopting an effective BYOD strategy.”



The bring-your-own-device (BYOD) phenomenon has evolved from movement to mainstay in business. Gartner's top 10 strategic IT predictions for 2014 stress that companies need to start preparing for an influx of mobile device usage at work. Another study also predicts that half of all employers will require employees to supply their own devices by 2017. While businesses are heavily investing in their own BYOD programs, balancing flexibility, confidentiality, and privacy requirements remain a challenge for IT administrators.

Security tops the list of BYOD challenges for any network administrator, which often prevents businesses from adopting an effective BYOD strategy. Despite the apparent benefits BYOD offers like increased productivity and flexibility, it also endangers corporate networks through possibly vulnerable employee-owned devices.

An NSA study even highlighted certain risks involved in the enterprise deployment of mobile devices, which include the likelihood of suffering a data breach. An example of this would be the Coca-Cola incident just this January. The company announced that the personal information of up to 74,000 former and current employees have been compromised. The probable cause of the breach was stolen unencrypted laptops. We also noted that two in five large-scale data breaches were caused by lost or stolen devices.

Countermeasures and Best Practices

While others may view BYOD as a gateway to breaches waiting to happen, mobile device management (MDM) solutions like Enterprise Mobile Security have the ability to minimize incidents of data loss or leakage.

A virtualized mobile infrastructure like that offered by Trend Micro™ Safe Mobile Workforce™ also complements existing MDM policies and protection technologies while addressing the issue of maintaining a centralized BYOD workspace.

With a virtualized solution, data is securely stored on corporate servers rather than on mobile devices so corporate data is easily separated from personal apps and data. With Safe Mobile Workforce’s help, you can safely access corporate data within the same mobile environment across both the iOS and Android™ platforms.

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: