Keeping Your Mobile Network Secure

As more and more of America’s workforce moves away from the office and into the field securing the employee’s mobile devices becomes paramount. There is also the rise of workers using their own personal mobile gadgets so crafting company policy should also include them as well.

According to PC Week by 2013 more than one-third of the global workforce will be mobile, and a study by Gartner found that 45 percent of workers in the United States work outside the traditional office at least eight hours per week. This can be great for keeping client relations positive with more site visits, allowing for a better work-life balance to retain key employees or even keeping office maintenance costs down.

However, organization security policies are surprisingly lax when it comes to keeping those devices secure. A recent survey by Sophos in the UK had some alarming returns.

46% of those surveyed allow or encourage the use of personal mobile devices for work
Only 55% of those allowing personal mobiles in the work place have password policies in place
41% of enterprises do not have a separate budget for mobile device security.

So how does a company keep its mobile network secure? Whether the Bring Your Own Device (BYOD) or a company issued mobile phone there are simple steps to implement as the first defense against security threats. They can and should be easily incorporated into company policy and employees should be required to implement them.

Use passwords. Seems easy enough doesn’t it? But most mobile users don’t use passwords to access their devices, especially their personal ones, but it’s a simple way to fend off threats if the device is lost. Common data wipe capabilities often come standard on mobile devices and will erase data after multiple invalid password attempts are made. Require that employees use unique passwords different from their own personal codes.

Data encryption is very useful to secure both data at rest and when information is being sent or received over the airwaves. Many models of mobile devices have the ability to encrypt data and user experience is minimal. Stored data can’t be accessed nor can user names and passwords be stolen.

Regularly back up all stored data from mobile devices. Cloud-based storage is an attractive idea as the data will be separate from the user as well as all other company locations and can be accessed from anywhere with a secure Internet connection.

Set up your phone’s auto-lock feature. Yes, it’s a pain, but if your phone or tablet is lost or stolen you’ll be thankful that it’s locked down and of course password enabled. Set it for the shortest time possible for your own tolerance.

Practice simple precautions. Accessing the web or opening email should be approached with the same caution and wariness that you use with your laptop or office computer. Malware knows no location and hackers will strike wherever the most value is for their efforts.

The professionals at DataComm Plus are well versed in all forms of mobile and office communications. Whether it’s the best apps for working remotely, the best phone systems for your particular needs or technology that allows meetings with partners worldwide,DataComm provides the technology and the training so our customers don’t miss a beat. Contact us to see how we can partner with you to solve all your office communication needs.
 

Related Posts
How to Stay Focused in the Workplace
When you are in the workplace, you are expected to work your hardest to fulfill all of your daily responsibilities. Despite our best efforts, the workplace often becomes a place ...
READ MORE
With lower price points Android is poised to eat the Apple.
Computers users are increasingly turning to tablets for portability and ease of use. And while most people continue to think of the iPad as the cool tablet on the block ...
READ MORE
Just stopped in to visit and have lunch with Equity Creative!
Visited with one of our awesome long time business partners Equity Creative.  This is their second location since we have been partnering with them and they continue to grow.  Equity ...
READ MORE
Video Conferencing: Saving Time and Money
Video conferencing is one of the most convenient, efficient, and cost-effective ways to communicate with business partners, vendors, employees, or any other contact that’s not in your office. Take a ...
READ MORE
Region’s Leading Unified Communications Provider Supports Business Continuity Planning While Enhancing Peace of Mind Among Small to Mid-sized CompaniesNEW BERLIN, WI — June 24, 2010 — Phones Plus, Inc., an ...
READ MORE
Hello everyone and happy spring (kind of).  I wanted to share some news that I am very excited about for the month of May...  We are hosting a lunch and ...
READ MORE
NEW BERLIN, WI While the US economy is still reeling from the recent financial turmoil, small to medium-sized businesses (SMBs) are driving the economic recovery. In today’s marketplace, the Internet ...
READ MORE
Who's running your online marketing?
Many, many companies when faced with starting a social media marketing program are tempted to put the nearest 23-year-old in charge and then trust them to produce a “viral video” ...
READ MORE
Video Surveillance: Keeping Your Business Safe
Video surveillance can be an important asset in keeping your employees, customers and assets safe. Look over the benefits we’ve outlined below to find out if surveillance could be the ...
READ MORE
Importance of Utilizing Phone Systems in Schools
Like any other business, schools need to have reliable phone systems. Whether a parent needs to deliver a message to their child during the school day or an emergency call ...
READ MORE
How to Stay Focused in the Workplace
Is Android Poised To Eat The Apple?
A visit with our long time business partner
Video Conferencing: Saving Time and Money
Phones Plus, Inc. Offers Innovative Data Backup Solutions
Lunch and Learn in May, 2011
Protecting Your Company Against Deadly Online Threats is
Under 30 Doesn’t Always Equal Online Expertise
Video Surveillance: Keeping Your Business Safe
Importance of Utilizing Phone Systems in Schools

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *