How to secure mobile devices
HOW TO POST
More and more businesses are using mobile devices like phones, tablets and laptops as a regular work tool.
Here are some important practices to consider while using them at work and home:
- Has your business developed a policy on the use of mobile devices at work and at home?
- Is there a clear definition between work and home on the mobile devices?
- Have employees been advised on what they should and should not download onto the mobile device to prevent malware and spyware?
- How complex are passwords on the employees’ mobile devices? Are they 4 digits or more or do they use biometrics?
- Can the mobile device be remotely controlled or wiped in case it is compromised, lost or stolen?
- How and where is sensitive company data stored, on-premise or cloud?
- Is the communication between the employees’ mobile devices and workplace encrypted?
There is much more to mobility and security. Mobile devices have been around for a long time now. A mobile device could be considered as the child, and the MDM and other security practices as the parent, of the infrastructure behind it. Good practice from the start with an appropriate infrastructure behind will ensure less risk in today’s high risk environment.