Hand to Cloud Security: How Bring Your Own Device Jeopardizes Data Security


The life of data is an eventful one. It moves between people and places, gets backed up to multiple locations and can undergo countless edits and revisions. Regardless of its journey, data needs protection. This is the first post in a three-part blog series that will discuss the different security available throughout the entire life of data—from hand to cloud, creation to destruction. The first topic? Data transport.

In today’s day and age, data is becoming more mobile—for better or for worse. An IT infrastructure can work hard to secure its contents internally, but once information leaves the environment security rests in the hands of whoever possesses the data. Sometimes it’s a skilled IT professional accessing company servers from a configured virtual PC. But sometimes it’s someone who loaded high-value data onto a $10 flash drive to finish a report at a coffee shop. End-user security is often the weakest link in the IT chain, and it only takes one vulnerability to start a breach.

Working remotely and transferring files between colleagues are two activities which lead to data movement. It’s important to find a way to maintain security without prohibiting these popular office activities. One of the easiest methods is to encrypt and protect data for transport. By using the best in encrypted devices, losing a flash drive or a laptop wouldn’t mean disaster. For motivation, just turn to Los Angeles County where over 160,000 people’s medical records were exposed after someone stole unencrypted laptops from a consulting firm, resulting in a huge class-action lawsuit.

Imation’s Secure Data Movement Architecture (SDMA) and IronKey secure storage flash drive can solve this problem. SDMA offers two-factor authentication through its Lock & Key component for use with the already encrypted, tamper-resistant IronKey. Not only can data be transported under the protection of IronKey encryption, but Lock & Key allows administrators to remotely restrict access to secure files and servers in case the device is lost or stolen. Essentially, credentials can be deleted to render an IronKey useless to a thief or terminated employee.

It’s becoming more and more common that IT managers tend to say, “No, you can’t do that.” Imation’s SDMA and IronKey allow managers to say “yes” to confidential document transport and working remotely.

What can be done to ensure security for data that isn’t in motion? Keep checking in with Imation to find out in the next Hand to Cloud Security post.