Mobile Tech: Is Yours Protected?

by admin | March 1, 2017


Data Loss, Malware, Malicious Websites, App Hijacks and Phishing: These are just some of the risks posed by mobile devices to corporate and private data.

BYOD (Bring Your Own Device) is common-place in most offices and growing. More and more, devices are used for mobile payments, online banking and shopping as well as accessing other private sources of information, but do you have any control over compromises of your data? The greatest mobile threats are:

  • Device loss and theft
  • Use of public Wi-Fi
  • Browsing the Internet
  • Downloading of third party apps
  • Lack of knowledge

How do you protect sensitive corporate email and files accessed by employees on their personal devices? If your mail system has no ability to enforce users to minimally secure their devices with a PIN, remotely disable email service to a device, or even wipe the device, what will be your exposure? What other company information is accessible from their phones and tablets? Have they set up a personal cloud storage service to make information available outside the office that otherwise would be only accessible on your network? If a device were lost, would you be able to:

  • Locate it
  • Lock it
  • Make it sound an alarm
  • Wipe it of all data

We have mobile security products for phones and tablets that are effective, easy to deploy and manage, and that do not adversely affect the performance or battery life of employees’ devices. Webroot SecureAnywhere® Business Mobile Protection offers protection for both Android and iOS devices. OpenDNS Umbrella adds an extra layer of protection when on public Wi-Fi connections. These products allow all of the above options from a single console. Both Webroot® and OpenDNS solutions are cloud-based using minimal device resources. Deployment via email link and automatic updating keep ongoing management simple and operational costs low.

Every company needs a mobile device policy which can be as simple as requiring that employees notify HR or IT of their intended use and that HR or IT keep track of who is using their devices for company access. When devices are replaced or employees leave the company, services to the devices should be terminated. There are various levels of management that can be implemented, but gaining control of your company information is critical. We have expertise on establishing policies and procedures and have tools for secure and managed cloud file sharing. Contact us today to get started!

Webroot®, SecureAnywhere®, Webroot SecureAnywhere®, and Smarter Cybersecurity™ are trademarks or registered trademarks of Webroot Inc.

Mac OS is a trademark of Apple Inc. - Android is a trademark of Google Inc.


Loading Conversation