Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Managing Mobile Workers

Posted May 19, 2011    Peter McCalister

According to a Runzheimer survey released last month, 45 percent of today’s workforce is mobile. For companies, having such an extensive number of remote employees can provide a number of great advantages, but it has plenty of downsides too.

Among the top concerns of enterprise executives is being able to effectively manage the mobile workforce to ensure maximum productivity and control the distribution of data. IT mangers have indicated that it is a lot more challenging to keep remote employees informed of security policies and initiatives. And on top of that, mobile workers are significantly more likely to access dangerous content than those in the office. Additionally, when employees bring their own personal mobile devices into the office network fray, security management can seem like a nightmare.

But it’s not all bad. By combining the deployment of up-to-date security solutions with instituting best practices and compliance standards, organizations have a golden opportunity to capitalize on all of the positive aspects of a mobile workforce, while minimizing the potential for data losses, breaches, or even worse. Part of companies’ mobile security strategy should also include implementing a least privilege solution, ensuring that remote workers can only access the data and perform the computing functions needed to do their jobs. Employees can’t lose what they can’t access.

Leave a Reply

Additional articles


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.

3d image Data Breach issues concept word cloud background

Experian/T-Mobile Data Breach: When 2 Days is not Enough

Posted October 2, 2015    Morey Haber

On October 1, Experian admitted full responsibility for the loss of T-Mobile customer data. 15 million user records dating back to 2013 were effected in the breach, with data including sensitive information that may be decryptable like social security numbers and drivers licenses.


Who Moved My Front Door? (What is Privileged Account Management?)

Posted October 1, 2015    Nigel Hedges

Not too long ago, I was sitting in a room with a very fluffy sales guy. In between words such as “we’ll make this happen” and “leave it with me, I’ll get it sorted” he asked the question “What is Privileged Account Management”?