The Information Commissioner believes that ever more popular mobile working practices will enhance both the “potential attack surface” for hackers and the risk of data breaches. The DPA requires data controllers to take “appropriate technical and organisational measures against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data”.The recent travails of TalkTalk are a potent reminder that the reputational risks of data breaches are also high for businesses. In addition to the number of management hours that can be lost, a recent survey by PwC found that, on average, businesses lost 13-24 man days in responding to each data breach at a cost of £3,000-£10,000; there is great incentive to ensure that breaches are prevented rather than cured. Therefore, what can and should bosses be doing to protect their businesses as mobile working increases?
Smartphones(1) Ensure every company issued phone with access to your secure server is protected with an alphanumeric password and set to lock automatically if the device is left idle. (2) Supplement this with the ability to wipe remotely the contents of the device in the event that it is lost or stolen. Applications that perform this function are readily available, but they must be set up in advance of phone loss. If you are considering a “bring your own device” (BYOD) approach, then take special care. Read more about BYOD:
- BYOD: What do businesses need to think about?
- A desk liberation that has led to a legal security nightmare
- Five things to consider before implementing BYOD
LaptopsThe use of laptops for mobile working has even greater potential for data breaches, given the large storage capacity and the more substantive work generally carried out on them. As such, employers should bear these suggestions in mind: (1) It almost goes without saying – remember to password protect all laptops. An unattended laptop represents an opportunity for security breaches. Laptops left idle should also be set to lock automatically. (2) Consider only allowing laptops access to your network, work related emails and documents if done through an encrypted Virtual Private Network – this includes not allowing employees to save documents to their device’s hard drive, in case the laptop is lost or stolen. The ICO will be publishing guidance for companies on the use of encryption early this year. (3) Use secure cloud servers for the exchange of large amounts of data remotely rather than relying on flash drives, which can more easily be lost or hacked. (4) Block access to potentially dangerous sites on your network by applying restrictions on users’ browsing and consider secure ‘sandbox’ browsers to allow employees to access personal-use sites such as Gmail and Facebook safely. (5) Although working in public places, such as trains, should be discouraged where possible, require employees to use privacy screens if this is unavoidable. A final suggestion relevant to all mobile devices is to prohibit employees from using unsecured Wi-Fi networks that are often provided for free in public places. It is relatively straightforward for hackers to intercept data on such networks and when the employee is abroad, there are added risks in that the servers may be in countries which are not deemed to have “adequate levels of protection”. A mobile data roaming package for employees may be expensive, but could prove an invaluable investment. In practice, mobile device security can be difficult to control both in terms of fast-changing technology and user practices, which are often casual and not mindful of data security. However there are steps that employers can take to minimise the risk of breaches and to protect themselves from the worst happening. Also, Seagate’s Sof Socratous discusses with Real Business the impact of BYOD, how it’s transforming the way SMEs store and access data at work, and the challenges a BYOD policy can bring. James Murray is an employment lawyer with an interest in data protection issues at Kingsley Napley.
Share this story