In the airport, on a train, in the comfort of your home – the ability to be able to work from anywhere has expanded the traditional workplace well beyond the office and created a strong reliance on mobile devices. We are constantly using our laptops, tablets, and smart phones to keep up with the demands of our careers, moving too quickly to consider the threat we have on the security of business information. This use of personal devices as professional communication tools has become a major obstacle in the challenge to maintain the security of company data.

Our mobile devices are links to information vital to getting our work done. From our contact lists and calendar appointments to our saved passwords and email correspondence, our devices hold information secure to both our personal and professional lives. The consequence of such data falling into the wrong hands is an enormous threat and may be more likely to occur than we realize. In addition to the vulnerabilities of theft and misplacement, every open WiFi hotspot, downloaded application, and public email service is a potential opportunity to expose secure data.

The Facts. A global study was conducted by the Ponemon Institute in order to measure the threats of unsecure devices and evaluate the severity of mobility risks. The 2012 survey interviewed over 4600 IT professionals and found that 51% of organizations have experienced data loss as a result of personal unsecure mobile devices. More than a third of those surveyed identified unsecure mobile devices as a key reason in the increase of malware infections by over 50%. The consequences of these security breaches included removal or loss of data, exposure of confidential information, and the loss of devices themselves.

Corporate Action. Many corporations have begun implementing mobile device management strategies to help combat the risks of personal unsecure devices. Hyatt Hotels requires all employees to register their mobile devices and enforces a strict policy to wipe all data from any device that is lost or stolen. IBM has published a list of approved and banned applications that prohibits use of DropBox and iCloud by employees. The company is seeking to partner with an alternative public file-transfer service that is willing to enter an enterprise agreement as a way to reduce liability concerns. Businesses such as Carfax have taken an entirely different approach to mobile security and have opted to provide employees with mobile devices that can be used for both professional and personal purposes. Providing their team with a consistent tablet or smart phone allows the company’s IT department to focus all efforts on a single device.

Personal Prevention. In addition to following corporate security policies, mobile device users can help protect information by utilizing privacy settings and following best practices. Requiring a passcode to gain access to your device may seem tedious but provides strong defense for lost or stolen devices. You may also have a data erase option that automatically defaults your device to factory settings after 10 incorrect passcode attempts. Being cautious of the links you open and apps you choose to download can also help to secure business information. Review the permissions each application requests and be weary of suspicious links in emails and text messages.

The biggest obstacle in combating personal unsecure devices is the struggle to stay ahead of the constant wave of platforms being launched. New devices are rapidly entering the marketplace and challenging IT professionals to promptly respond with updated security standards. While it is certainly an uphill battle for security personnel, corporate action and personal practice can provide an effective means to keep the information on your mobile device safe and sound.