In a recent survey conducted by Techaisle, looking at technology adoption amongst SMB’s they found that 9 out of 10 mobile workers spend at least 20% of their work time away from their primary workplace and 63% of businesses say that mobility increases the efficiency of their business processes.
In today’s digital world the need to have a productive, mobile workforce has become the normality. Yet with increased mobility comes increased security risks, even if mobility only means users accessing corporate e-mail on their mobile phones.
The use of Microsoft Office 365 has given businesses of all sizes easy access to a very robust and cost effective platform that offers e-mail, applications such as Word, Excel and PowerPoint, collaboration tools such as Skype for Business and SharePoint and file storage in the form of OneDrive. At Zenzero we have been helping a constant stream of customers move from traditional, on premise platforms to the Microsoft cloud and then enjoy the associated benefits.
While there is no hiding from the fact that businesses must embrace mobility and flexible working if they are to succeed in today’s digital world, it is imperative that they keep control of key business systems and ensure data remains safe. In a survey conducted by Computing 80% of the individuals questioned admitted to using non-approved Software-as-a-Service (SaaS) applications in their job, these will be tools such as Dropbox, Google Drive or Evernote.
Data is the life blood of any organisation and while losing a single file isn’t necessarily the end of the world, if key documents fall in to the wrong hands or significant data is lost then that will be financially damaging, it will cause disruption, have negative impact on reputation or even lead to legal action.
Microsoft has built the Enterprise Mobility Suite (EMS) platform to support a safe, more productive platform. EMS is made up of four components that offer organisations the ability to provide single sign-on for cloud applications, conditional access ensuring that data is only available to the users you want on the devices that you allow and threat detection to highlight suspicious activities and malicious attacks. The policy based approach ensures that security is applied to the areas it is needed for specific business needs.
What this really means is;
– Prevent data leakage of company data by restricting actions such as copy and paste between corporate and non-corporate applications
– Provide single sign-on to all business applications, making it easier enforce secure password policies
– Detect and alert against data breaches by using behavioural analysis to stop access from unauthorised devices, locations or users
– Protect sensitive e-mails by restricting copying, forwarding and printing of content
– Disable access to all company resources and applications, including over 2,000 cloud products with a single click
– Allow users to safely use both personal and company issue PC’s and mobile devices to access corporate data safe in the knowledge the data is protected