We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Mobile devices weak link in data security

Mobile devices weak link in data security

posted in Cyber-Security ● 9 Dec 2014

A recent study by Loudhouse Research indicates an understanding within the business IT community that inadequately managed mobile devices represent a significant business risk. In addition, the study demonstrates that many professionals are struggling to mitigate that risk. 66% of respondents acknowledged that they find it difficult to keep up with current and emerging mobile threats and 2/3rds of respondents believed the number of data breaches their firm had experienced via mobile devices had increased in the last year. Only 35% answered that they are very confident their data is fully protected from unauthorised access via mobile devices.

The use of mobile devices in the workplace has obvious benefits. However, IT staff need to be able to audit, manage, monitor and control the access and storing of business data on mobile devices in order to ensure adequate security and sovereignty of data. In addition, IT teams need to be able to ensure that all mobile devices which have access to company data and the office network are securely patched and have appropriate security in place such as screen lock and anti-virus software. 

Redstor’s cloud sync and share service, Centrastor, is delivered from highly secure and resilient UK data centres and enables IT to audit what is being shared and with whom, whilst delivering the flexibility that employees demand in today’s connected world. The service features the ability to remote wipe sensitive data should a device be lost or stolen or should an employee leave the organisation.

Centrastor enables employees to access files remotely and share and collaborate with colleagues and customers, storing confidential business (and personal) information securely. In so doing, Centrastor improves data access for users without compromising governance and security and with support for a range of mobile operating systems, the service facilitates complete user choice in terms of device type.

Additionally, our endpoint management service, CentraStage, empowers IT administrators and service desks with complete visibility and control of their IT estate, from mobile devices through to servers, via a single cloud-based platform. CentraStage provides remote takeover, software and script deployment with patch and power management, to any device, from anywhere with an Internet connection.

Redstor has a strong reputation for providing secure and encrypted cloud services, protecting the data of over 10,000 organisations across the UK. Redstor’s cloud backup service securely backs up data in an encrypted format to Redstor’s UK data centres and our Virtual Disaster Recovery service enables organisations to be back up and runnning within minutes following a disaster.

To find out more about our services and how we can help you comply with data protection laws and prevent data leakage, please contact us either by giving us a ring on 01189 515 200 or emailing [email protected].

Xero Data Backup

Why you should consider Xero Data Backup for your accountancy firm

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”
Continue reading

Survey on risk of data loss and cybercrime

Wondering how best to fend off new cyber threats? Curious about what your peers are doing?

Continue reading
Benefits of Outsourced Data Backup

Analysing the benefits of outsourced data backup

There are many reasons that businesses and their IT teams may weigh up the option to backup and protect data with an inhouse solutions versus outsourcing data backup.

Continue reading