(Page 2 of 2)
How was data integrity maintained in the past? Since the creation of the alphabet — when information was able to be written down, stored and shared across geographic distances — means of data verification have existed.
Certified messengers, both on foot and on horseback, along with the occasional carrier pigeon, were responsible for delivering information from a verifiable source. Security measures of the time included using wax seals as a way to identify fraudulent documents.
Encryption keeps data secure both while it is in transmission from sender to receiver; at rest on the server; or in a secure, on-device container. Encryption codes require shared knowledge between anyone accessing or viewing information. In order to give the information any meaning, you must unlock the code. From the Ancient Egyptians all the way to encrypted floppy disks or USBs, codes have long been a way to securely transmit data.
Data protection is equally as important when it comes to sharing or accessing data on mobile devices. We've all heard the stories about unsafe consumer grade cloud storage options. While these alternatives may be simple for end-users, they are an IT nightmare. Organizations need to invest in solutions that combine enterprise-grade security with ease of use for the end user.
It’s true that enterprise mobility does pose a new set of IT challenges for maintaining information security. However, the need to secure data remains the same, and the means to do so will continue to evolve in order to adapt to new technologies and new ways of accessing sensitive information.
About the Author
Anders Lofgren is Director of Product Management, Mobility, at GroupLogic, an Acronis company. He oversaw the launch of GroupLogic's mobilEcho, an award-winning mobile file management software, in 2011.
- Endangered Species: The Corporate Intranet
- Multitasking? You're Killing Yourself for Nothing
- Forget Intranets, Give Me an ESN
- Are These Vendors the Best at Social Media Monitoring?
- Think Digital Marketing Technology: Think ... Microsoft?
- Microsoft's New BI Tool Plays Nice, Even With 3rd Party Vendors
- Beware Red Herrings: Intranet vs. ESN is a Sham