3 Ways to Keep Your Sensitive Data Secure in Today’s Mobile Workforce

New workstyles demand new security awareness. Here are 3 ways to keep your sensitive data secure in today's mobile workforce.

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|desktop” admin_label=”Section” _builder_version=”3.22″ background_color=”#f7f7f4″ custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_3,2_3″ padding_mobile=”on” column_padding_mobile=”on” admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”0px|||” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Day” _builder_version=”3.27.4″ text_text_color=”#323232″ text_font_size=”75″ text_line_height=”1.1em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”0px||0px|” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]16
[/et_pb_text][et_pb_text admin_label=”Month and Year” _builder_version=”3.27.4″ text_text_color=”#363636″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”-10px||0px|” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]MAY, 2017
[/et_pb_text][et_pb_text admin_label=”Categories” _builder_version=”3.27.4″ text_text_color=”#ff4e53″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”20px|||” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]GUEST BLOG POST BY CONCUR
INDUSTRY INSIGHTS
[/et_pb_text][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Intro Paragraph” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”30px||0px|” text_font_size_last_edited=”off|tablet” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]New workstyles demand new security awareness. While this is a simple concept to grasp, it can be a very challenging problem for many companies to solve—especially if they’re small and medium sized businesses—as time is precious and cash flow can be tight.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row padding_mobile=”on” column_padding_mobile=”on” custom_padding_last_edited=”on|tablet” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”50px|||” custom_padding_tablet=”17px|||” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Today’s Workstyles Demand New Security Awareness” _builder_version=”4.0.6″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”30px||0px|” text_font_size_last_edited=”off|tablet” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]

Today’s Workstyles Demand New Security Awareness

To accommodate new workstyles and increase productivity, today’s workers require greater access and more timely connections to information. Millennials, especially, prefer office mobility. Enabling this access with the wrong systems in place can make your company’s sensitive data vulnerable.

In fact, with mobility on the rise, it’s important to discern where these security risks are coming from. Recent studies by Citrix and Cisco Systems provides the following insight about workplace mobility:

  • 68% of workers access files from smartphones
  • 52% of workers use public file sharing services
  • 28% of workers travel for business
  • 64% of businesses in North America and Europe identify providing mobility support for employees as a top priority

As workers want to work anywhere, at any time, it is critical to address how the locations, technologies and styles they prefer can present risks to their businesses’ information. Here are a few ways to eliminate some of that risk:[/et_pb_text][et_pb_text admin_label=”1. Educate Workers On Best Practices” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”30px||0px|” text_font_size_tablet=”” text_font_size_phone=”” text_font_size_last_edited=”on|tablet” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]

1. Educate Workers On Best Practices

Your employees should be educated your company’s data security during onboarding. Whether they’re working from laptop or smartphone, they’re responsible for sensitive corporate data. It’s important to think of the following when working out of the office:

  • Be careful how you’re sharing files, especially with public file-sharing applications like Drobox, Box.net, OwnCloud, Minbox and JungleDisk, to name a few.
  • Consider secure communications such as VPNs or secure shared drives.
  • Be aware of what kids and spouses are doing on your computer as applications from storefronts, as well as music or video downloads can infect a system with malware.
  • Educate employees on recognizing a phishing email.

[/et_pb_text][et_pb_text admin_label=”2. Be Aware” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]

2. Be Aware

Long workdays traveling and being in public places can be especially dangerous for your company’s data security. It’s a normal human tendency to be tired and distracted from travel or being on the road, so educating employees on being aware of carelessness or negligence in these situations is important. Here are a couple things to consider:

  • Don’t leave laptops, tablets or smartphones sitting around at a conference or other public space.
  • Report missing devices immediately.
  • Take steps to determine the potential for a breach, even if sensitive data is encrypted on machines.
  • Educate employees on the significance of information security, and their role to help reduce the risk of a security breach.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row padding_mobile=”on” column_padding_mobile=”on” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”50px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_divider color=”#aeaeac” admin_label=”Divider” _builder_version=”3.2″ hide_on_mobile=”off” global_colors_info=”{}”][/et_pb_divider][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ text_text_color=”#363636″ text_font_size=”20″ text_line_height=”1.3em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width=”900px” module_alignment=”center” custom_margin=”16px||30px|” text_font_size_tablet=”” text_font_size_phone=”” text_font_size_last_edited=”on|phone” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]68% of workers access files from smartphones.
– Citrix Mobility Survey
[/et_pb_text][et_pb_divider color=”#aeaeac” admin_label=”Divider” _builder_version=”3.2″ hide_on_mobile=”off” global_colors_info=”{}”][/et_pb_divider][/et_pb_column][/et_pb_row][et_pb_row padding_mobile=”on” column_padding_mobile=”on” custom_padding_last_edited=”on|tablet” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_padding=”50px|||” custom_padding_tablet=”17px|||” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”3. Work With What You Have to Implement Cloud-Based Data Security” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]

3. Work With What You Have to Implement Cloud-Based Data Security

There are options for cloud-based data security that can be catered to your small to medium sized businesses’ unique needs and systems while naturally integrating mobility into your workplace.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”About This Guest Post” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]

About This Guest Post

This guest blog post was contributed by Concur through their partnership with APS. The APS Partner Program is designed to be different. We provide a better way to enhance relationships and elevate your business. APS exclusively aligns with trusted brokers, CPA firms, financial advisors, and consultants to provide a mutually beneficial relationship that delivers.
[/et_pb_text][et_pb_button button_url=”https://apspayroll.com/partner-program/” url_new_window=”on” button_text=”Learn More” button_alignment=”center” admin_label=”Button” _builder_version=”3.16″ button_letter_spacing_hover=”0″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”0″ button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https://apspayroll.com/wp-content/uploads/2017/04/concur-logo-trans-375.png” alt=”Concur Business Travel & Expense Management” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”Concur Business Travel & Expense Management” _builder_version=”3.23″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%” use_border_color=”off” border_color=”#ffffff” border_style=”solid” animation=”left” sticky=”off” always_center_on_mobile=”on” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Section” _builder_version=”3.22″ custom_css_main_element=”height: 450px” global_colors_info=”{}”][et_pb_row padding_mobile=”off” column_padding_mobile=”on” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”780px” use_custom_width=”on” custom_width_px=”780px” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Blog Subscribe CTA” _builder_version=”3.27.4″ text_text_color=”#363636″ text_font_size=”26″ text_line_height=”1.4em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” module_alignment=”center” custom_margin=”||70px|” text_font_size_tablet=”” text_font_size_phone=”” text_font_size_last_edited=”on|desktop” use_border_color=”off” border_color=”#ffffff” border_style=”solid” global_colors_info=”{}”]Love What You Just Read?
Subscribe to our Awesome Blog.

[pardot-form height=”250″ id=”455″ title=”Subscribe to Blog”]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]