Mobile Enterprise DOs and DON'Ts

[vc_row][vc_column][vc_column_text]

There are currently more devices than people on the planet and businesses are changing the way they work in order to reap the benefits. While having an on-the-go workforce means greater productivity in the field, it can also lead to security threats if not managed appropriately. It is estimated that by 2015, the mobile workforce will reach 1.3 billion people which is nearly 37% of the total workforce.
As the mobile enterprise continues to grow, here are some DOs and DON’Ts to ensure your information remains secure:

DOs:

  • Lock your Device – this isn’t the be-all end-all security solution but it certainly helps, especially if a device is lost or stolen. PINS, passwords or newer technologies such as fingerprint scanners are all great ways to keep unwanted eyes out.
  • Update your Apps – download updates as soon as possible after they are released to ensure that all security flaws have been worked out. This protects both the individual and the enterprise from data breaches. (It is important to note that many devices are being utilized for both personal and professional use).
  • Follow your Company’s Social Media Policies – brush up on your organization’s social media policies. If there isn’t one in place, consider instating one. Simply put, use social media responsibly. Take caution in what you are posting (no insider information or office drama) and where you are posting it.
  • Setup Employee Devices with MDM or Encryption – employees that can access company networks and private data via their mobile devices should be equipped with some sort of MDM or encryption technology. This is the responsibility of the company/IT department and should be taken seriously, especially if BYOD programs are in place.

DON'Ts:

  • Store Sensitive Data on Unauthorized Devices – Unless your company has a BYOD (bring your own device) program in place, storing sensitive data on your personal smartphone or tablet can severely compromise security. This is especially true if the device is set to sync with cloud storage or other backup programs.
  • Open Questionable Data from Unknown Sources – spam and malicious links via mobile are growing in numbers; therefore it is important to never open unrecognizable/unknown information from your device. Furthermore, don’t download apps from unapproved or untrusted third party sources. Google and Apple do a pretty good job of screening out harmful software, but it’s not foolproof, so use your best judgment.
  • Use Public or Unsecure Wi-Fi – stick to private and secure networks (such as WPA2 encryption networks) when using mobile devices carrying sensitive company information. Public Wi-Fi gives others the ability to access your stored information or even takeover your device through its apps.

For more information on securing your mobile enterprise technologies, fill out the contact form to the right or call us directly at 800-550-3795.

[/vc_column_text][vc_raw_js]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[/vc_raw_js][/vc_column][/vc_row]

Continued Reading

Compliance

Top 10 Strategic Tech Trends for 2014

Gartner’s Top 10 Strategic Technology Trends for 2014 IT industry […]

LEARN MORE

Top 3 Cloud Computing Trends for 2014

[vc_row][vc_column][vc_column_text] Get Your Head IN the Clouds A 2014 Cloud […]

LEARN MORE

Contact us Today!

Chat with an expert about your business’s technology needs.