Risks and Costs of Unsecure Mobile Devices at Work

2017-07-27T00:00:59+00:00 February 18th, 2016|News|

February 18, 2016 – Today the average person owns 5 devices, with 3.5 devices (e.g. iPad, laptop) being carried at work. Companies have quickly begun to allow their employees to use personal devices to conduct work-related tasks, but without considering the hidden business risks associated with BYOD.

Allowing your employees to use their personal devices to share data leads to serious concerns around data protection and prevention. Here are the top hidden risks and costs of unsecure mobile devices at work, and why you need to consider Mobile Device Management (MDM).

Containerization of data

Companies allow BYOD because it provides business functionality, flexibility and accessibility to employees. People are able to work more efficiently and be more productive, whether they are in the office or out. Work is no longer a place, it’s wherever you are at any moment in time. That’s why having secure, intuitive access to the company’s data and applications is critical to productivity in the “real world”.

What many companies don’t consider when adopting a BYOD environment are any potential business risks that come from not having any proper security and policies in place – leaving data unprotected and subject to leakage.

When there is not a plan in place for a BYOD approach what gets missed is corporate control over multiple devices. In order to implement a secure and effective strategy, you need to implement a BYOD corporate policy and a solution that includes MDM. Mobile Device Management reduces your business risk by managing all your employees’ devices under one console. You contain the data, monitor it, control it, and protect it. If an issue arises from a personal device (e.g. virus) you will be able to contain and resolve that issue in a secure and timely manner.

Penalties and Fees

When you don’t control the flow of your corporate data you are putting your company at high risk for not meeting compliance requirements for HIPAA, banking, customers, or partners.

Under HIPAA, for example, there are severe penalties that are tied to every individual piece of information that leaks. These penalties – in the nature of fees – are substantial and could shut down your business.

And don’t think that your business is not big enough to be hit. Any industry that has valuable assets (e.g. medical records, phone numbers, social security numbers, and merger information) is susceptible to regulation. Protecting your data across mobile devices will save you money in the long term.

MDM focuses on a cost avoidance approach. It reduces exposure of corporate data, while monitoring any suspicious activity. It can locate and lock lost or stolen data from any device, and can also remove or restore data from any mobile device. MDM also allows you to target different groups within your company with customized policies. For example, your HR staff might need more protection than other departments since they deal with a greater amount of confidential data.

There are real tangible business reasons that drive your business staff to use the personal devices at work in order to be productive – they just need to be secured and controlled. Without anyone meaning to be malicious, companies can lose control of confidential data, putting at risk their customers and their businesses. Mobile Device Management puts that control back in place, regardless of the device your employees are using.

If you are not sure how to start with MDM, partnering with an IT consulting company like Coretek can be cost efficient and reduce your stress. Coretek helps companies understand the risk associated with leaving your data unprotected. Based on your current needs, we provide the most suitable solution to prevent any unpleasant and costly security surprises. For more information, please visit Coretek here.


2017-07-27T00:00:59+00:00 February 5th, 2016|Azure, News|

FARMINGTON HILLS, Mich., January 15th, 2016 – Coretek Services, one of the leading IT consulting and systems integrators, announced the new cloud practice director, Jason Cornellier. His new focus for the cloud practice will consist of two main functions. One, to be the first truly “Born in the Cloud” Managed Service Provider based on Microsoft Azure, and two, (of equal importance), Cloud focused professional services. The practice focus is the brain child of the long time collaboration of Jason Cornellier and his mentor, the CEO of Coretek Services, Ron Lisch.

Jason Cornellier recently joined Coretek Services as the Cloud Practice Director. He joins Coretek from Microsoft, where he led the America’s Worldwide Center of Excellence for Cloud and Datacenter. As the lead on this global team he provided a CTO function internally in the organization and for customers at large. Jason has a diverse background as a technologist, being well versed in Azure and Microsoft-based datacenter solutions, including a background in many open source technologies. Enterprise customers who have worked with him have described his influence as being a “Transformation or Organizational Catalyst”, focusing on the entirety of a solution including people, process and technology. He has 20 years of experience including deep industry knowledge on financial services, healthcare, manufacturing and retail and is committed to delivering business capabilities built on technology.

About Coretek Services
Coretek Services is a Systems Integration and IT Consulting Company that delivers high value and innovative solutions.  Coretek works with your team to custom-design an IT architecture based on each clients’ unique requirements; the solution encompasses server and desktop virtualization, optimization of a virtual desktop environment, cloud desktop, mobile device management, infrastructure consulting and project management.  Our goal is to help our clients achieve Project Success.  No exceptions.

The Top 3 Ways Your Employees Put Your Company at Risk

2017-07-27T00:00:59+00:00 February 4th, 2016|News|

February 4, 2016 – It’s not a surprise that mobile device management enables companies to reduce costs by managing all corporate and BYOD mobile devices under one central administrative console. And allowing staff to use their personal devices – as opposed to a company provided device – can provide another significant cost savings.

What most IT managers might not know is that EMM (Enterprise Mobility Management) also carries other indirect cost savings, including securing your corporate network across all the different devices your employees now use.

The purpose of EMM is to increase the functionality of all mobile devices within your company while also protecting your organization from possible security attacks or data leaks.

Here are the 3 top ways your employees are unknowingly putting your company at risk by accessing corporate data on their personal mobile devices.

Risk number 1: BYOD

An average person has a minimum of 3 devices connected to the company network – often without IT’s knowledge. With companies now allowing employees to use their own mobile devices, you can lose the ability to monitor and control what and how data is being shared across devices.

Many companies allow their staff to receive work-related emails on their personal devices. The issue here is not only that emails are on a personal device, but that they are  unprotected and could be lost or hacked. Today, a large amount of confidential company information is sent or received via email. This includes things like restricted employee or customer personal information (that are protected under HIPPAA, FINRA or other compliance regulations).

These are major issues if the network used to share your corporate information is not secured. It leaves room for third party infiltration. EMM allows you to set up virtual private networks (VPN) and remote desktop services, which helps protect your corporate data across multiple devices and outside the office.

Risk number 2: Data Leakage

Many employees won’t bother checking with your IT team before downloading an app for work or using a cloud solution like DropBox to get their job done. Today, employees use many different cloud solutions, whether approved by IT or not.

When employees utilize the cloud on their own terms, it leaves your company with no data control, as files can be shared from any unsecured device or network outside your office. If there is no cloud encryption, this leaves room for a possible data leakage. EMM lets you securely manage data on all mobile devices.

Risk number 3: Uninformed employees

Employees usually don’t intend to put their organizations at risk. Often, they’re just trying to “do their job efficiently.” With the “consumerization of IT,” cloud options are readily available to your employees, and widely used in the personal sphere, so employees feel comfortable taking these options into their own hands.

When your company doesn’t have a BYOD policy well-defined and implemented, you are more susceptible to data leaks and potential regulatory fines and penalties. And don’t think you won’t be affected. All businesses are at risk of potential fines and subject to regulations (e.g. healthcare, law firms). Every company has confidential data, whether it’s employee data, medical data, credit card information or even merger and acquisition information.

When you establish IT standards and train your employees on how to securely share data across devices, you reduce your risk. MDM can additionally help minimize compliance infractions with comprehensive security, control, and audit features.

Now that you know how your employees are unconsciously putting your company at risk, consider how your IT team can protect and optimize the everyday functionality of your business.

Mobile Device Management enables your IT staff to be more productive anywhere with any device, while securing company data, monitoring employees’ activities across multiple devices and managing these personal devices. If you’re not sure how to begin, there are consulting companies like Coretek that provide appropriate solutions to your company’s needs and will assist you throughout the process. For more information, please visit Coretek Services’ page.