Welcome back to our multi-part series on data security!
On the one hand, new devices such as smart phones and tablets can increase employee productivity – and when employees use their own devices – they can save the company money. But this new “bring your own device” (BYOD) environment brings new headaches, too.
These devices are easily lost and stolen. When they are, any information available to the device – including confidential practice and client data – may be vulnerable to illicit access. Yet fewer than 50% of businesses report the ability to use data encryption and/or remote data wiping to protect their assets.
It is vital to take stock of your data inventory: you need to share permissions reports that reveal which devices and users have access to which files and applications.