Mobile Tech: Is Yours Protected?

by admin | August 7, 2020

AdobeStock_97458300.jpeg

Data Loss, Malware, Malicious Websites, App Hijacks, Phishing, Smishing (SMS fishing), spam calls: These are just some of the risks posed by mobile devices to corporate and private data.

BYOD (Bring Your Own Device) is common-place in most offices and become even more prevalent as the need to work from home has increased with the pandemic. Mobile devices are used for mobile payments, online banking and shopping as well as accessing other private sources of information. Now you may be allowing them to access company resources, but do you have any control over compromises of your data? Some of the greatest mobile threats are:

  • Device loss or theft
  • Unsecured Wi-Fi
  • Network Spoofing
  • Phishing
  • Unsafe Apps
  • Lack of knowledge

How do you protect sensitive corporate email and files accessed by employees on their personal devices? If your mail system has no ability to enforce users to minimally secure their devices with a PIN, remotely disable email service to a device, or even wipe the device, what will be your exposure? What other company information is accessible from their phones, tablets and home computers? Have they set up a personal cloud storage service to make information available outside the office that otherwise would be only accessible on your network? If a device were lost, would you be able to:

  • Locate it
  • Lock it
  • Make it sound an alarm
  • Wipe it of all data

All devices should have malware protection installed. For phones and tablets, protection should include the ability to track, lock and even wipe a device if lost or stolen. VPN solutions are advisable, but only from trusted sources since they have the ability to snoop all data on the VPN. OpenDNS Umbrella adds an extra layer of protection when on public Wi-Fi connections for Windows and Mac OS devices. Solutions are available for tracking, locking and wiping lost computers and we order all new laptops with the protection.

Every company needs a mobile device policy which can be as simple as requiring that employees notify HR or IT of their intended use and that HR or IT keep track of who is using their devices for company access. When devices are replaced or employees leave the company, services to the devices should be terminated. There are various levels of management that can be implemented, but gaining control of your company information is critical. We have expertise on establishing policies and procedures and have tools for secure and managed cloud file sharing. Contact us today to get started!

Webroot®, SecureAnywhere®, Webroot SecureAnywhere®, and Smarter Cybersecurity™ are trademarks or registered trademarks of Webroot Inc.

Mac OS is a trademark of Apple Inc.


Comments:

Loading Conversation