The auditing process is nothing new. While everyone is familiar with auditing from a tax or accounting perspective, the goal is no different when it comes to IT control over enterprise mobility -- what matters is ensuring data is being accessed and used for legitimate reasons.

Ancient Greeks used a system wherein two different people recorded transactions in order to maintain a record that could not be altered retroactively. Presently, auditing is used by a variety of industries to make sure processes are kept timely and above board, and it is just as important when your IT department is faced with the challenge of securely integrating mobile access to the corporate network.

Data Integrity

Your IT department should be regularly monitoring the corporate network for vulnerabilities posed by granting access to hundreds and thousands of new devices. Updating an organization’s security infrastructure according to vulnerabilities revealed in a thorough review of network portals is not all that different than historical measures.

How was data integrity maintained in the past? Since the creation of the alphabet -- when information was able to be written down, stored and shared across geographic distances -- means of data verification have existed.

Certified messengers, both on foot and on horseback, along with the occasional carrier pigeon, were responsible for delivering information from a verifiable source. Security measures of the time included using wax seals as a way to identify fraudulent documents.


Encryption keeps data secure both while it is in transmission from sender to receiver; at rest on the server; or in a secure, on-device container. Encryption codes require shared knowledge between anyone accessing or viewing information. In order to give the information any meaning, you must unlock the code. From the Ancient Egyptians all the way to encrypted floppy disks or USBs, codes have long been a way to securely transmit data.

Data protection is equally as important when it comes to sharing or accessing data on mobile devices. We've all heard the stories about unsafe consumer grade cloud storage options. While these alternatives may be simple for end-users, they are an IT nightmare. Organizations need to invest in solutions that combine enterprise-grade security with ease of use for the end user.

It’s true that enterprise mobility does pose a new set of IT challenges for maintaining information security. However, the need to secure data remains the same, and the means to do so will continue to evolve in order to adapt to new technologies and new ways of accessing sensitive information.