The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 24 mai 2019
Since May 25, 2018, the implementation of the GDPR (General Data Protection Regulation) has changed the way personal data is collected, organized, managed and protected by all organizations. Using smartphones, employees are able to access their company’s customer or prospect database. Data that is tightly regulated by the GDPR. Compliance with the new European regulation is a substantive work on both PCs and smartphones, since the latter, just like computers, are more and more connected to company servers. While the GDPR brings new rights and protections for consumers, it also affects mobile data security. Mobile risk management must become a priority for IT.
And yet, what’s more difficult to secure than a device that can be connected to multiple networks, with many applications both personal and professional, and where communications (voice, SMS, email, instant messaging) can be intercepted?
Read also: What cyber threats are targeting your organization’s mobile communications and data? – Act I
The GDPR makes businesses accountable: Protecting data and their usage must be real and effective. In case of audit or data leak, it will be necessary to prove that everything has been done to protect and secure personal data stored on company smartphones. This usually requires a robust solution well beyond the features of a simple MDM (Mobile Device Management) solution.
The GDPR mandates impact analysis for data protection. That is, each organization must take the time to map all information flows and data stored on company servers and devices, including mobile devices. Who has access to what data? For what purpose? What are the fences and safeguards in place? Who manages access rights?
Read also: Are the smartphones of your organization secure?
So many questions that must be anticipated, with a “privacy-by-design” approach that makes security an absolute obligation when creating a digital project.
Risk management must therefore drive organizations to secure business phones with the highest standards.
A few examples:
This effort goes beyond IT, and should involve HR (education and internal policies), Legal (legal advice and legal risk management), Communications (internal communications) and the executive management (to drive activities and place security front and center).
Read also: Destabilization, espionage, sabotage: raising awareness at the management level
Because it requires new, stricter and more protective standards, the GDPR should be seen as a chance for organizations to turn an obligation into an opportunity. Because the fundamental issue is not so much about expending efforts to comply with the GDPR and secure mobile data, but to measure time and money saved compared to the very real consequences of an attack on one or several smartphones in your fleet.
Cet article vous a plu ? N'hésitez pas à le partager