Ensuring Data Security When Implementing M-learning

Ensuring Data Security When Implementing M-learning

Ensuring Data Security When Implementing M-learning

Recently, the US military command’s (Centcom) Twitter and YouTube accounts were hacked allegedly by those backing Islamic State. Centcom stated that it was “cyber-vandalism” and that no sensitive data has been compromised. Data security has become an increasingly worrisome phenomenon, not just for governments but also for corporate organizations. Employees are increasingly using their personal devices – smartphones, tablets and phablets for accessing companies’ data which includes corporate training content.

With mobile learning being increasingly popular and in demand, you cannot afford to deprive your employees of the option. At the same time, you have to safeguard your organization’s interests and ensure that there are no data breaches. So, how do you prepare for “mobile data security” as your employees continue to use their devices outside the company’s secured network area?

When implementing mobile learning in your organization, it is important to involve the IT department to assess and analyze the potential data breaches that might occur. Appropriate safeguards that are taken with respect to other corporate data such as e-mails and documents will have to be enforced for mobile learning resources as well.

There are service providers who are gearing up to cater to this new demand for mobile data security. Here are some of them that might cater to your requirements. 

MDM for Office 365

Microsoft is introducing an application called Mobile Device Management (MDM) as a part of its Office 365 suite to cater to the growing demand for mobile data security. The features enable organizations to secure and manage their corporate resources, wipe out data selectively when an employee leaves the organization, safeguard corporate data when the device is lost or stolen and so on. Additionally, organizations can subscribe to advanced features through Microsoft Intune to get additional device and application management capabilities.

Vodafone Secure Device Manager

Vodafone Secure Device Manager enables employees to use their smartphones or tables with appropriate checks and balances to ensure company data security. Once employees register their device to access corporate data, content access can be controlled remotely. Access to the data can be assigned and removed as and when required by the IT department. It also helps protect sensitive information in case of loss of the device.

Sophos Mobile Control:

Sophos Mobile Control is an enterprise mobile management solution that is offered either on premise or as a service. It claims to make it easier for organizations to adopt BYOD policy as mobile devices, content and applications can be managed easily from a central location.

2X Mobile Device Manager:

2X Mobile Device Manager enables organizations to monitor BYOD devices, lock or delete data in case of device theft or loss. Organizations can also monitor devices for potentially harmful applications and malware and remove them. The software currently supports Android and iOS devices, Windows 7 and Window 8 laptops.

Bluebox Security:

Bluebox SaaS mobile data security solution is based on ‘data-wrapping’ technology and focused on the data that needs to be secured more than the device. It provides key inputs to the IT manager to monitor security policies and make changes based on insights provided by the software. It allows users to divide personal and corporate data to ensure privacy while enforcing corporate data security.

The list is not comprehensive as there are many more providers providing mobile data security. This list is based on preliminary research. Do you use any mobile data security applications in your organization? Would welcome you to add to the list with names of service providers you use in your organization. It would be great if you could share your experiences about how it has helped secure your corporate data.

Disclaimer: The information has been compiled based on the information published online. Independent assessment and discretion needs to be exercised to establish their suitability for your organization.

View eBook on Mobile Learning 101: All You Need to Know to Get Started with Mobile Learning Design and Development