Download presentation
Presentation is loading. Please wait.
Published byEdwina Alexander Modified over 7 years ago
1
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Done by: IRENE MULEMIA WAFULA
2
OUR COMPANY East African Data Handlers is basically known as a data recovery center. Services we offer: - Forensics investigations IT support Vulnerability assessment and penetration testing IT Security and Forensics training Off site & online data backup Mobile device management( Managing all organization devices) Mobile device tracking Laptop tracking Enterprise solutions(hardware & software supply)
3
Data Data : is the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media. Mobility: is the ability to move or be moved freely and easily..
4
Data Mobility Data mobility: means immediate and self-service data access. How? It accelerates application development, faster testing and business acceptance, more development output, improve productivity and improve time-to-impact business intelligence.
5
Applications Remote Access: Used for telecommuters accessing to the corporations’ network, home users accessing Internet Software that can be used: GoToMyPC VNC Remote Desktop Applications Team Viewer ETC.
6
Benefits Of Data Mobility
Easy accessibility of data Enhances employee engagement and Increases staff responsiveness Improves efficiency and effectiveness Reduces IT costs Supports effective customer engagement Increases production and saves time Improves data storage and file management: Also it saves on paper work and makes transfer and access of data remote.
7
THREATS DATA LEAKS From third-party apps DATA LOSS
From lost , stolen, or decommissioned devices DATA HIJACKING By mobile malware SECURITY RISK From unsecure public Wi-Fi EXPOSURE From Mobile OS & app vulnerabilities
8
HOW TO SECURE THE DATA Devise appropriate security measures to protect data + devices Establish monitoring practices Recommend a Mobile Device Management program Optimise business applications for mobile usage by utilising the cloud Determine how to integrate mobility into current IT strategies Provide solutions that integrate all devices into a consistent experience Explore + implement the appropriate virtualisation solutions Assess security vulnerabilities from external and internal points Develop and implement an end to end security strategy Improve detection and reaction time to security incidents Mitigate compliance risk and manage compliance requirements Protect your network in the face of increasing mobility Defend your infrastructure from cyber attack. e.g ransom ware attacks ,
9
Thank you for your attention
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.