Data Protection: How BYOD and falling in love with your mobile device causes IT headaches

mobile-love.jpgAs mobile workers develop strong preferences and become emotionally attached to their mobile devices, there's little doubt that the popularity of BYOD (Bring Your Own Device) with smartphones and tablets has rattled the nerves of IT managers. 

 

The rapid shift to mobile-based computing has changed how information is accessed and shared; data is exploding at the edge, everywhere, on a sea of devices. Important business data continues to make its way from the data center to endpoint devices such as laptops, tablets, and smartphones.  According to Gartner, approximately 70% of all organizational data resides outside the data center, on a PC file.  That means if there is not a deliberate and prudent strategy to protect user laptops then over two-thirds of an organization’s data is at risk—a recipe for disaster. 

 

Wait…where’s my laptop?

Up to 12,000 laptops are lost in U.S. airports each week. The real loss is the data that might need to be re-created if it was not properly protected. In fact, according to IDC, $14,000 in productivity is lost per worker each year due to the inability to find or access the data they require to work.  And another real concern is revealed in a recent study by Forrester that found 61% of users say they have taken their own steps to protect data, mostly through consumer grade online solutions (yikes!).  As a result, corporate data leaks outsides the company firewall, and if the employee leaves the company their data goes with them—BYOD policy or not.

Despite these staggering statistics only 37% of enterprise data centers provide any sort of endpoint data protection, making the risk of data leakage, outright data loss, and failure to meet compliance and litigation requirements tremendous.

 

Creating a reliable backup strategy

Because the risk of loss of unique corporate data is so high, the protection of these devices must be taken seriously.  It cannot be left up to either the good will of the users or a contract with a consumer-grade, public cloud provider.  Not only is this kind of backup strategy unreliable, but it promotes costly data leakage.

 

For the enterprise, protection of these devices needs to be an IT service that is managed and monitored centrally to ensure that all data is being systematically protected.  This is critical from a data protection standpoint as well as to ensure that the data can be leveraged for future litigation readiness or big data analysis.

 

Implementing a reliable backup strategy is challenging, but IT can no longer sit on the sidelines hoping that users “do the right thing” with an organization’s “in-the-wild” data.  Doing so leads to a variety of problems, including loss and leakage of data and the risk of not meeting compliance and litigation requirements. IT needs an endpoint data protection solution that offers users value, so they will embrace it.  It should also add value to the organization in the form of reduced risk, and a stronger compliance stance.  

 

It’s time to protect and leverage all of your corporate data in a mobile world, and HP Connected Backup can help you do just that.

 

#HPDPB

 

Edited by Robin Hardy

Labels: Data Protection
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Su serves as Director of Product Marketing for HP Connected Backup and LiveVault, and has more than 20 years of experience in enterprise sof...
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.