5 Overlooked IT Security Measures All Small Businesses Must Have in Place When Using Mobile Devices
Updated: Mar 21
1. You must implement a mobile device policy –
If you as a small business owner want a safe network, we are of the view that you must have strong IT security for mobile phones.We at Cinnte think tahat this is particularly important if your employees are using their own personal devices to access company e-mail and data. If that employee leaves, are you allowed to erase company data from their phone?
If your phone is lost or stolen, are you permitted to remotely wipe the device – which would delete all of that employee’s photos, videos, texts, etc. This is to ensure YOUR clients’ information isn’t compromised? Cisco have written about mobile device security for business recently.
Further, if your data in your organization is highly sensitive, such as patient records, credit card information, financial information and the likes, you may not be legally permitted to allow employees to access it. Especially on devices that are not secured, but that doesn’t mean an employee might not innocently “take work home.” If it’s a company-owned device, you need to detail what an employee can and cannot do with that device. This is including “rooting” or “jail-breaking” the device to get around security procedures you put in place.
2. You require STRONG passwords and passcodes to lock mobile devices-
We recommend that passwords should be at least 8 characters and contain lowercase and uppercase letters, symbols and at least one number. On a cell phone, requiring a passcode to be entered will go a long way in preventing a stolen device from being compromised. IT security for mobile has never been more important of over 50% of businesses using mobile to access work related data.
3. Require all mobile devices be encrypted-
We believe that encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that unlocks. We recently wrote about how hackers can access and use your business data on thr dark web here.
4. Implement a remote wipe software for lost or stolen devices-
If you find a laptop was taken or a cell phone lost, remote “kill” or wipe software will allow you to disable the device and erase any and all sensitive data remotely.
5. You must backup remote devices-
If you implement step 4, you’ll need to have a backup of everything you’re erasing. To that end, make sure you are backing up all MOBILE devices including laptops so you can quickly restore the data. IT security for mobile phones is critical in any small business in the current technological era.
While these 5 are a good start, many organizations that are heavily using mobile devices or are handling highly sensitive data such as credit card numbers, financial information, social security numbers or medical records need to be far more diligent about monitoring and securing all mobile devices. For those of you who fit into that category, we have a special report that details X more security measures and strategies that you need to implement and know about that most IT firms don’t know or won’t tell you.
For a free copy, simply call my office at 0494360080, or shoot us an e-mail to email@example.com with “Mobile security report” in the subject line. We look forward to hearing from you before August 31st to get your free report!
[/et_pb_text][et_pb_cta title=”Fill Out the Form Below to Get Your Free Mobile Report” _builder_version=”3.20.1″ header_level=”h1″ header_font=”||||||||” header_text_color=”#edf000″ header_font_size=”27px” body_font=”||||||||” custom_button=”on” button_text_color=”#edf000″ button_font=”||||||||”][/et_pb_cta][et_pb_code _builder_version=”3.20.1″][/et_pb_code][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.0.47″][/et_pb_column][/et_pb_row][/et_pb_section]