Do You Have an Effective BYOD Policy?

According to new IDC data, vendors shipped 327.6 million smartphones in the third quarter, an increase of 25.2%, when compared to the same quarter last year. This means that global smartphone shipments have topped 300 million shipments for the second quarter in a row. Although there have been rumors of a slowing market, the data clearly states otherwise. As technology pushes small to medium sized businesses towards smartphones and other mobile devices in the workplace, it is more important than ever to establish an effective BYOD (Bring Your Own Device) policy. 1.     Decide What Mobile Devices Are Allowed  If your company allows your employees to bring their own devices to work, it can be a nightmare for IT to have to support multiple platforms. Therefore, it is important to decide what devices are allowed to be used for work. Decide whether it is more cost-effective to purchase your own company devices to hand out to employees. 2.     Establish BYOD Security Policies It is important for your company to establish an “acceptable use policy” for their mobile devices. This will curb employee distractions and reduce risks for harmful viruses and malware. Your company should also develop a monitoring system and disciplinary action for employees who disobey the policy. Although this may seem harsh, it may avoid a security breach down the road. 3.     Employee Exit Policy In addition to creating an acceptable use policy, it is equally important to come up with an exit policy for when employees leave the company. Document in your employee exit checklist to ensure you remove the employee from access to information on the network,...

Can You Survive a Network Security Attack

Businesses are under constant attack from a variety of network security threats.  Cybercriminals hack databases for passwords for unauthorized access to your network.  Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard drive and destroy application data and files without your knowledge. Businesses large and small face these network security threats on a daily basis; larger organizations, however, may have more resources to fight attacks.  Small businesses may be more vulnerable to downtime and loss of productivity because of thinner margins and resources. Here are a few steps you can take to survive a network security attack. Prevent Network Security Attacks Before they Occur Protect your network by making sure all devices are in compliance with the latest anti-virus and malware updates. Ensure your operating system (O/S) patches are up to date. Protect your network with strong passwords and require your employees to change them regularly.  Discourage writing passwords down, and make sure employees are aware of the risks of a network security attack. Lock Down your Mobile Devices Mobile devices including smartphones and tablets are particularly vulnerable to theft and loss. Passwords on these devices can be easily cracked leaving your applications and data vulnerable to unauthorized access. Train your employees to report theft or loss of mobile devices quickly, and make sure that all data on the device is encrypted.  Having the ability to track and wipe data from these devices is another option to ensure you can survive a network security threat. Backup Your Data Online Backup and Cloud Backup are affordable options to have quick access to applications and data...

Mobile Security: Does Your SmartPhone need a Kill Switch?

Many Smartphones and Tablet computers have access to corporate applications and their data through Bring Your Own Device (BYOD) policies and corporate-sponsored mobility strategies.  Mobile Security has become a popular topic for good reason.  According to CIO Insights, mobile data traffic is expected to increase eleven-fold by 2018. Because of increasing data traffic on mobile devices, some government agencies are looking at legislation to require manufacturers to add a smartphone kill switch to remotely wipe a mobile device if it is lost or stolen. Keeping in mind that a four-digit iPhone passcode could be hacked in minutes, this begs the question: Does your Smartphone Need a Kill Switch? Having a smartphone Kill Switch may give a sense of false security.  Adding a kill switch to protect your privacy and corporate information is reactive, rather than proactive.  If not done properly, you could wipe your employees’ irreplaceable information, such as family photos.  A Kill Switch may also make the phone entirely unrecoverable.  This means you will surely need to replace the device once the remote kill switch is invoked. Proactive Mobile Security Before you hit the Kill Switch consider proactive mobile-security measures. Smartphones and Tablets are great innovations that allow your employees to stay in touch and work anywhere.  Access to email, operational data, financial information, and customer information through a mobile device can empower your employees and increase their productivity.  Access to this information should be password-protected at all times.  Additionally, any corporate data should be encrypted in transit and at rest. Only approved applications should be allowed on the mobile device and personal data should be stored in...

Mobile Security: Why Should I Care?

Mobile security is top of mind when it comes to concerns for IT Managers.  According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops.   It is no surprise that mobile devices are the target of mobile security threats. Chances are most people in your company have a smartphone, tablet or both.  In some cases these devices connect to your company network using WiFi.  It is equally likely that these devices access company information via email, mobile applications or file synch to company data.  Now that these devices are universal, it is important to have a plan if they are lost or stolen. Keep in mind, your four digit password may be the only thing between an intruder and your data.  Here are some additional considerations for mobile security. Mobile Security Policy While you can remotely wipe a Mobile devices when it is lost or stolen, this may not be enough.  That four digit passcode can be easily hacked in minutes.  It is important that employees know how to report a lost or stolen device immediately.  Also consider, there may be personal information on the device that is property of your employee.  This data may not be backed up and could be impossible to recover. There may be local laws that prevent you from wiping this type of data from personal devices.  If your employees access your corporate systems, be sure they sign and acknowledge your company policy for acceptable use, including policy for reporting...
Skip to content