4 Strategies for Improving Security of Mobile Devices
June 26, 2013
Mobile solutions are everywhere in the American workplace today. As tablet and smartphone technologies improve over time, companies are realizing more and more the benefits they can draw from using the devices in their offices. These electronics are no longer viewed as a novelty or a passing fad – they’re a mainstay, and they’re making businesses more efficient every day.
There’s a catch, though. With the rising popularity of the mobile realm comes an increase in security risks. Hackers are lurking, waiting to steal information both from individuals and for their employers, that they can use for financial gain. People must do more to stay secure in light of all the threats in cyberspace.
Here are four steps they can take.
Companies have an obligation to keep their data secure, and that begins with keeping it on secure networks. Individual employees can no longer be trusted to use their data plans or their own private Wi-Fi networks to access or share work information – the risks are too great. Instead, they should use private, secure office networks for their professional data, avoiding any potential risks.
Using stronger passwords
TechTarget recently reported that 26 percent of corporations that allow bring your own device (BYOD) policies that don’t require passcodes to access mobile devices. Of the rest, 53 percent have PINs of four or five digits and 16 percent have six- or seven-digit access codes. Only 2 percent require alphanumeric passwords, which are a more secure way of safeguarding more information. Businesses must eliminate laziness and protect their data better.
For companies who allow employees to mix business and personal information on their own private devices, it may be necessary to wipe those devices clean so that no professional data is corrupted by malware that an individual downloaded on his or her own time. Security threats are everywhere on people’s personal smartphones, but companies must make sure their sensitive information isn’t contaminated.
Deploying software solutions
If all of the above strategies aren’t enough to protect corporate data, then it may be necessary for companies to purchase software solutions that monitor their networks and keep suspicious agents from infecting their data. Today’s malware protection software is stronger than ever, and while it can be expensive, it might be a sound investment.
Mobile devices are constantly under fire in today’s business world. Companies must do what they can to protect their data, as the consequences of a security breach can be catastrophic.