Skip to content

The ABC(DE)s of Mobile Security

As of September 2019, research conducted by Verizon states that almost half of enterprises, that’s right…half, are willing to sacrifice their mobile security to gain “advantages” in speed and productivity. This marks an increase from 2018, when this metric was measured at a still-too-high one-third of enterprises. Of course, such behaviors could bring severe consequences.

That’s why we wanted to share how your business could exercise mobility while preserving security.

Why You Need Mobile Security as a Small/Medium-Sized Business

Once upon a time, cybercrime was a simple animal. A target was picked, and the method of breaching it was developed. This meant that the smart strategy for cybercriminals was to focus their efforts on larger targets, as breaching them would be more profitable for cybercriminals to take the time to do.

Unfortunately for the SMB, this is no longer the case.

Nowadays, like many other industries, cybercrime has largely become automated. So, once an attack is designed, there is no reason that a cybercriminal wouldn’t use it against various businesses. It’s a little like using a bug zapper compared to the traditional flyswatter–you actually have to swing around the flyswatter actively, whereas a bug zapper allows you to set it up and let it do the work for you. Less effort for equal (or really, improved) results.

Furthermore, a mobile device does tend to invite a greater risk of other kinds of cybercrime. Actual device theft is much easier when the device in question can be casually picked up and walked off with by a stranger, which is more likely to happen outside the office than within its walls. Convenience is a cyber criminal’s best friend.

What to Do About It

Therefore, you need to make sure that the mobile devices your employees are using throughout their day have the proper protections and that (perhaps even more importantly) your employees are actually using them properly.

Here, we’ve put together a quick guide to help you get started with a more secure mobile strategy–and to hopefully make it more memorable, it follows the alphabet!

Mobile Security, as Simple as A-B-C-D-E

Authentication

Okay, so one of the fundamental concerns of the mobile security issue is that it is harder to ensure that only someone with permission to access data is actually going to be accessing it. Let’s face it, all it takes to have a device stolen potentially is for someone to leave their phone unattended in the coffee shop as they add more creamer. However, with the right authentication measures, the risk of thieves accessing data is greatly reduced.

Enforcing strong passwords and requiring two-factor authentication measures for your data helps to restrict access to your data to just the people who should have it. Therefore, this is the first step in any data protection process.

Backups

As we will get into, a big part of keeping the data accessible on mobile devices safe is the capability to delete it. As a result, it is important that you can then restore this data and continue using it once the issue has been resolved. Maintaining an up-to-date backup will ensure that you can do so.

Keep checking back on this blog to learn what makes a backup as reliable as can be, or give us a call to find out.

Control

While yes, the mobile devices that your employees own are their property, you cannot allow them to use them as a part of a mobile device strategy if they are going to expose your business to security threats or vulnerabilities. The apps a user installs can contribute to both, so you must ensure that certain applications are blocked. You can do this by using a mobile device management solution. Then, encourage your staff to update their software frequently.

Deletion

Unfortunately, mistakes will be made, and one of them may include one of your staff members actually losing their device. If a device turns up missing, you will want to have the means to wipe the device in question. Ensure your mobile device management solution can remotely wipe any company-owned data from the device in question. If the device is found somewhere, the data can be restored from the aforementioned backups.

Mobile Security Education

Finally, to help your users avoid mobile security issues, you must teach them a few key behaviors they must adopt. For instance, public Wi-Fi networks are notorious for harboring massive security threats that can access a device once it connects. Especially as something is downloaded.

Encourage your users to use their mobile data instead. Preferably with the added support of a virtual private network or VPN. They also shouldn’t be downloading things casually, either.

While we may have covered a lot, the real key here is to promote responsible usage of one’s device. This is something that someone using a personally-owned device will generally encourage. To really secure a device, mobile device management solutions are perhaps your best option.

For help implementing such protections or with any other business technology question, give WheelHouse IT a call at (877) 771-2384.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.