5 tips for business mobile phone security
With the introduction of more and more Smartphones and Tablets to businesses, and the way we communicate information on the hop, we are much more reliant on our access to this technology. How do we ensure that we maximise the security on this channel?
We look at 5 top tips to easily securing you and your staff’s mobiles that will ensure you and your company’s data remains safe.
- Lock your device: Lost and stolen devices continue to be the most serious threat for businesses and consumers. By simply adding the lock function to your settings you are already creating a hurdle for any attacker. Just like locking your car. Look at protecting the information as well as the device: carefully ensure your data is encrypted sufficiently before allowing your staff access through the Cloud. Develop and enforce strong security policies for using mobile devices for instance enforcing strong passwords that will help secure any data stored on someone’s phone if the device is lost or hacked.
- Use caution when enabling Bluetooth connections – a phone’s Bluetooth setting is on by default, so it will need to be turned off or paired with the device and configured with the headset. If not, the device will look for other Bluetooth-enabled phones to connect to, and could result in malware being loaded on to the device.
- Avoid Questionable Apps – Malicious software has ways of infecting phones via apps. One of the most infamous occasions recorded was the DroidDream infecting over a quarter of a million Android Phones. Only download apps from trusted app stores and ensure to keep to the most popular ones.
- Back up your data.
This seems like common sense. Treat your phone like you PC and always back up.
- Provide a framework
Educate and enforce strict policies among your staff so that the boundaries are set.
Businesses all over are enjoying the benefits that Smartphone technology can bring to their levels of productivity. As a new phenomenon we can be quite naive about the levels of risk attached to the Cloud and more importantly, access to it. Especially for small businesses whereby certain procedures are much more lax. We must put the proper measures in place.