Smartphone Security

In the 21st century mobile phones are an important extension of our professional lives. We sync emails to our phone,

Smartphone Security In the 21st century mobile phones are an important extension of our professional lives. We sync emails to our phone, take calls from customers, make business transactions and use specific apps for particular organisational purposes.

In fact, the functionality of a mobile phone has reached such unprecedented levels that unfortunately smartphone security has taken a hit as a result.

Due to the sensitive information that is now being transferred between employee smart phones, businesses are being targeted by internet criminals who will retrieve private company information.

We already had it drilled into us to protect our PCs, but how do we go about safeguarding our mobile phone devices?

We have suggested a number of precautions that you should take in order to minimise the risk of a cyber attack happening to your business via a mobile phone.

 

1. Implement security policies to keep data secure and confidential.

2. Carefully think about the type of smart phone that will be used for business. Android phones have been deemed more at risk than their alternatives due to their PC like nature. In fact, 79% of malicious attacks on mobiles in 2012 occurred on devices running Google’s Android operating system.

3. Consider using privacy apps such as, Silent Circle, Mobile Vault, and TigerText.

4. Regulate which mobile phone devices are allowed to access your network; apply connection policies and regulate which software is allowed on mobile devices.

5. Only use trusted Wi-Fi networks on business phones – this rules out your weekly coffee break at Starbucks!

6. Set standards for which types of data can be stored on mobile devices.

7. Make it clear to employees that business phones are not to be used for personal matters or for storing personal data.

8. Install anti-virus and malware protection on mobile devices.

9. Back up your data!

10. Offer training for employees on data security practices and take steps to ensure all staff understand internal policies fully.

11. When disposing of a smart phone, you should destroy the device and ensure any embedded data cannot be retrieved.