19 April 2018
Robert Siciliano

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

747Posts 2,138,350Views 62Comments

Eight ways to secure your employees' mobile devices

15 February 2016  |  3297 views  |  1

Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.

What does it all mean? Companies must take extra precautions to ensure that sensitive data doesn’t get into the wrong hands.

Protecting your data

Fortunately, there are several steps that a business owner can take to protect the information on employees’ mobile devices. Here are some tips:

  1. Make sure all devices are password protected.
  2. Require all employees to use an “erase data” function after a certain number of failed password attempts.
  3. Make sure all devices used for business purposes have a “wipe” ability. This allows you to wipe the information on the phone remotely in case it is stolen.
  4. Make sure your staff installs any security patches or updates that become available. These are often published due to security vulnerabilities.
  5. Employees should only download software from approved application providers with solid reputations.
  6. Antivirus protection must be a requirement for Androids.
  7. Make sure employees are discerning about the websites they visit and the links they click on. Too many clicks may lead them to a malicious site that could put data at risk. This also applies to e-mail and text messages.
  8. Employees should know that Wi-Fi is not secure. This is especially true of public Wi-Fi connections. To help guard their information, consider using a virtual private network service.

It doesn’t take much to secure the info your staff needs to do their jobs. A few simple strategies can provide a protective shield that will keep your company’s information safe, no matter where employees find themselves.

 

 

a member-uploaded image TagsSecurity

Comments: (1)

Lee Mughal
Lee Mughal - Flarian - Dubai | 19 February, 2016, 16:18

Agree with you mobile application on high and peoples are suing it in every field to complete work in minimus time.

1 thumb up! 1 thumb up! (Log in to thumb up)
Comment on this story (membership required)

Latest posts from Robert

Mobile Phone Numbers Are as Sensitive as Your Social Security Number

2 hours ago  |  712 views  |  0 comments | recomends Recommends 0 TagsSecurity

The Term Identity Theft Protection is Often a Lie

06 April 2018  |  5083 views  |  0 comments | recomends Recommends 0 TagsSecurity

Use a Password Manager Or You WILL Get Hacked

19 March 2018  |  3740 views  |  0 comments | recomends Recommends 0 TagsSecurity

14 Social Media Disasters Ready to Strike

03 March 2018  |  4862 views  |  0 comments | recomends Recommends 0 TagsSecurity

Understanding and Stopping Criminal Identity Theft

23 February 2018  |  6543 views  |  0 comments | recomends Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Member since 2009
739 posts62 comments

Who's commenting on Robert's posts