Categories: Articles

Employee Devices Bring Added Security Concerns

used with permission from Microsoft SMB Blog
by Cindy Bates

Employee Devices Bring Added Security Concerns

The explosion in recent years of mobility solutions and employee’s bringing their own devices has had a big impact on small businesses. In fact, 52 percent of information workers across 17 countries report using three or more devices for work, according to research from Forrester and 61 percent of workers mix personal and work on their devices.

On one hand, there are huge benefits for organizations and employees — employees can be far more productive and work on the go with untethered access to the information they need. Business owners can also realize cost savings while reducing the time spent managing IT. Yet, there are risks: namely, how do businesses protect confidential information from leaking outside of the organization when employees can access and store data in a multitude of ways across devices.

When employees use personal devices for work, they can be mishandled inadvertently, like an accidental forward of a confidential mail, or in more nefarious ways, such as a hacker gaining access to confidential information through stolen credentials. According to a Verizon data breach investigation report, 75 percent of network intrusions used weak or stolen credentials to gain access.

It’s important to have a strong device policy in place but even when the rules are clear, there is room left for costly errors. CEB found that as many as 93 percent of employees admit to violating information security policies. That means, depending on your business, there is a wide variety of data that could be at risk. It may be customers’ personally identifiable information, such as in healthcare, retail or financial institutions, or company confidential information, such as trade secrets, company financials, or employee records. With so much data available, traditional company firewalls and perimeter solutions no longer suffice to protect confidential information wherever it lives. Today, many small businesses are cobbling together a number of solutions to attempt to solve this problem. But none tie it all together until now.

Microsoft has developed Microsoft Enterprise Mobility Suite (EMS), which is the only comprehensive solution that protects information assets across four layers: user identity, content, applications & cloud services, and devices. When combined with Office 365, it offers native protection for applications and services your customers use every day. Best of all, it’s about half the cost of competitive solutions. Not only is EMS flexible and easy to integrate, it offers enterprise-grade security for small businesses. Key security features include:

  • Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away.
  • Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc.
  • Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.

To learn more about protecting your business, visit Microsoft Enterprise Mobility or watch this video. Ready to integrate EMS?

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

The Executive’s Guide to Security Operations Center Models

Cyber threats never take a day off, never clock out and go home at the…

3 days ago

Introduction to Azure Services

Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…

3 days ago

Introduction to Microsoft Copilot

Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…

4 days ago

Project Management: Why is it important?

Making things happen is the art and science of project management. The process involves managing…

1 week ago

Enhancing Website Performance and User Experience Through Caching Strategies

In today's fast digital life, website performance is important, as it holds visitors and ensures…

1 week ago

Protecting Municipal Data: Security Tips for City Officials

The FBI reported that cyber attacks against government facilities saw an increase of almost 36…

1 week ago