Edit ModuleShow Tags

Seven great ways to limit mobile threats


BYOD, short for “bring your own device,” is an increasingly popular trend for employees, who want to stay connected 24/7 by bringing their favorite mobile devices, such as smartphones and tablets, to the workplace.  In fact, 74 percent of companies allow some sort of BYOD usage, but less than 10 percent of organizations are fully aware of the devices accessing their network, according to a 2012 survey by Enterasys Secure Networks.

The BYOD concept has multiple work benefits including: 1) allowing employees to work on the move; 2) boosting productivity with access to email and Internet; and 3) cost-effectiveness, especially for small and medium-sized businesses that can’t afford company-issued mobile devices to employees.

However, BYOD can be tricky for an IT team. According to a recent survey of IT professionals by Ponemon Institute, 51 percent of organizations have lost data due to unsecured devices within the past year. With smartphones being easy targets for hackers, it’s important to take steps to protect your customer data and  intellectual property.

To protect your business and your customers, it’s crucial to educate employees on the threat of unsecured devices and then implement a mobile security policy that outlines the company's position on managing these devices.

Within your BYOD policy, consider including these seven simple tips: 

Password-protect mobile devices

This step may seem obvious, but 36 percent of consumers do not use password protection, according to a recent global survey by McAfee and One Poll. In the case that a mobile device is lost or stolen, the most critical applications—such as email, text, banking, social media and payment apps—are 100 percent accessible.

Setting a password is no guarantee that data will not be accessible, but it’s the easiest first step. Mobile devices already have the basic feature to set a lock requiring a passcode or pattern for access, and it will only take a couple extra seconds to unlock your smartphone.  If you’re already using a password, it’s important not to use simple combinations like 1234 or 0000.

Don’t store personal data on mobile devices

This tip is straightforward; just don’t do it. Don’t store your personal or company credit card numbers and checking account numbers on your smartphone or through text messages. The best approach is to save sensitive and confidential data directly on your company’s secure server.

Control wireless network connectivity

Most mobile devices’ default settings automatically connect to nearby Wi-Fi networks, if they’re available. Some of these networks may be completely open and unsecured.

The safest setting is to automatically connect only to trusted networks—like at work or home—and set your device to ask permission before connecting to any other network it finds.  Bonus: this tip will help save your phone or tablet’s battery life as well.

Sync or backup your data

Assuming that you backup your computer data locally on the company server or a cloud-based service, you should also regularly backup your smartphone or tablet. This will make it easy to recover data in the case of theft or loss.

It can be time-consuming, but try to sync your data, apps, email, calendar and photos at least monthly. It’ll save time in the long run.

Be cautious of free apps

You know the phrase: there’s no such thing as free. Some free apps try to make money from tracking personal information to sell your profile to advertising companies.

However, there are fun, useful free apps you can use securely. The best way to spot these secure apps is to closely look at the permissions the app is requesting, read the reviews and download only from reputable publishers.

Set up a remote wipe service

Set up your smartphone or tablet for a “find my phone” or “wipe my phone” service to help locate or remotely wipe data from your phone should it be lost or stolen. Both the iPhone and Windows Phone have a free “find my phone” service that locates your device on a map, locks it and as a last resort, wipes all its data. As for Android users, this type of service is not currently available.  Instead, choose from third-party applications, such as Lookout.

Download mobile security apps

Just as there is a lot of security software available for computers, there are many security applications that provide protection from mobile hackers. For example, Comcast has created an app called Constant Guard Mobile that helps prevent online threats, such as phishing attempts, identity theft and accidental connection to fraudulent websites while browsing, shopping and banking online. When looking for a security application, be sure it features real-time protection. Unlike the “find my phone” service list above, this feature will help you protect your mobile device as you use it and not after it is lost or stolen, which hopefully never happens.

Edit Module
Shawn Adamson

Shawn Adamson, the Vice President of Commercial Business Services for Comcast’s Mile High Region, is responsible for developing and implementing Comcast's innovative commercial services offerings in the small, medium and enterprise business markets. She leads Comcast as it continues to deliver new technologies and services to its business customers, including the launch of Metro Ethernet. She has nearly 20 years of management experience in sales and operations. Shawn can be reached by email at shawn_adamson@cable.comcast.com

Get more content like this: Subscribe to the magazine | Sign up for our Free e-newsletter

Edit ModuleShow Tags

Archive »Related Articles

Antlers at Vail Hotel Reveals $4 Million Renovation Plan

The remodel is planned to start in April 2019, with completion anticipated in time for the 2019-20 ski season.

Collegiate Peaks Bank Opens Additional Downtown Denver Branch

The bank has been serving customers throughout RiNo and downtown Denver for more than a decade, and the new building will enable the bank to provide more convenience and even better service to existing and new clients.

8 Ways to Throw a Successful Pity Party

Protecting your struggle is a sure sign that you (your identity, beliefs and capabilities) have become captive to the struggle.
Edit ModuleShow Tags
Edit ModuleEdit ModuleShow Tags
Edit ModuleShow Tags Edit ModuleShow Tags
Edit ModuleShow Tags Edit ModuleShow Tags
Edit ModuleShow Tags Edit ModuleShow Tags