Data security

Data security in mobile devices and software and in information traffic 

When talking about data security needs of businesses and communities, we have to consider all relevant also mobile use related data security issues. Typically these things are defined in our "Data Security of Mobility" -workshop and in interviews with the different user groups of ICT management. Essential is to minimize risks and offer at least a satisfactory data security with pleasant user experience. The level of the data security to define is depending a lot from the type of business the target organization is in. 



Device level data security is related to the encryption of the device's physical memory, the used PIN and ecryption codes and their lenght and number of tries before the automated locking or emptying of the device. The device's abilty in the aforementioned procedures varies depending on the platform (whether the device is Apple, Android or Windows / Windows Phone). Some of the devices work with just numbers (no letters), some of them have hte device's memory in an encrypted state etc. Our experts give precise estimates on how your current device investments can get their best possible data security out. 



Software level data security relates to things like email usage in mobile devices and connections to the organization's other information systems. These can be customer management software CRM (Customer Relationship Management), UCC- Unified Communication & Collaboration) -software and connections for activity management systems (ERP, Enterprise Resource Planning). The employer's software at use can be organized together in their own application store or own 'sandbox', which workspace (=the physical memory) is encrypted and the access to the workspace is protected with a password. The same device can be in use of family members outside office hours and that is why the aforementioned protection is necessary. In this situation also our experts will give support with defining the right and application related security rules. 



Encryption of telecommunication is often related to the connection from mobile device (laptop, tablet, smartphone) to organization's information systems. The connection can be implemented from a third part VPN (Virtual Private Network) connection that is an encrypted 'tunnel' from the device to the organization's information systems and back. When downloading content (e.g. documents) to a mobile device from a desired data storage (network drive or a cloud storage outside intranet) the telecommunication during the downloading be very heavily encrypted. In addition it is often required that the document downloaded to a device is heavily ecrypted, before the document is opened to the screen for reading and editing. Encrypted connection should also disconnect after a certain period of time. If needed we will gladly give more information on how using email from a mobile device can be made more safe and how sensitive material can be safely handled from a mobile device. 




The device's memory being in encrypted state, the device can be emptied or left in encrypted state by sending the device a encryption key's destruction order if needed (for example in a situation of theft or disappearance). This way the device is left permanently encrypted, where the device's memory's information content will be nothing but a scrambled mess for the thief.  The device's information is safe from outsiders.




How to proceed for increasing one's data security?


With the help of our experts we will map out the data security of your mobility with consideration to the needs of your business and ICT management. Based on the mapping we then give an estimate of your current data security level and recommendations of actions and platforms for the part of used applications and content.