Global Information Technology
February 12, 2013
The advantages of mobility, when combined with cloud computing, pose an even greater level of risk. Every iPhone user has an iTunes account, which is essentially a private cloud for that user. As an example, inadvertently saving sensitive data to iCloud or iTunes could result in risks ranging from damages to West’s reputation to financial loss. To mitigate these risks, West IT is deploying the appropriate supporting security technologies, such as encryption and mobile device management.
Today, we most often “consume” information with our smartphones and tablet devices, and we often store receipts for expense reports or make purchases through mobile apps. In the near future, we expect that West will be using these devices to capture and create company information. This is a rapidly changing space, and West IT will continue to remain current with trends in mobile technologies as well as uses for cloud computing. Along with this, IT will be updating security standards more frequently along with the supporting infrastructure and software to ensure that our information assets remain protected.