Remote work and data security challenges in finance - Global Banking & Finance Review
An insightful image depicting the challenges of remote work in finance, highlighting the importance of data security to prevent financial implications of data loss.
Videos

REMOTE WORKING AND THE FINANCIAL IMPLICATIONS ASSOCIATED WITH DATA LOSS

Published by Uma Rajagopal

Posted on December 11, 2014

1 min read
Add as preferred source on Google

Global Banking & Finance Review interview Nick Banks, VP EMEA and APAC of Imation’s IronKey Solutions to discuss recent research on remote and flexible workers. We take a look at how organisations can address the huge challenge of providing secure access to corporate networks and data for employees on the move, and how to avoid the financial implications associated with data loss.

Key Takeaways

  • Remote and flexible work significantly increases risk of data loss due to insecure transport of corporate data.
  • Many employees take sensitive data off‑site without encryption, exposing organisations to financial and reputational loss.
  • IronKey by Imation offers centrally managed, encrypted hardware solutions to mitigate mobile data security risks.
  • Implementing remote wipe, encryption, and policy‑based controls can reduce financial implications of data breaches in remote work.
  • Secure mobile access requires both user behavior change and robust technology management to bridge security confidence gaps.

References

Frequently Asked Questions

Why is remote working increasing financial risk from data loss?
Employees often transport unencrypted sensitive data on mobile devices, leading to high costs from breaches and loss of corporate information.
What security solutions does IronKey provide?
IronKey offers military‑grade encrypted USB and hardware devices with remote management, wipe, and policy enforcement capability.
How can organisations reduce data loss costs?
By deploying encryption, secure removable storage, and remote management tools, companies can limit breach impact and control data access centrally.

Tags

Related Articles

More from Videos

Explore more articles in the Videos category