The BYOD movement and flexibility being given to workers using mobile devices of their choice can be free for some. For others, such as cyber security conscious, it can be a bit of a nightmare for any new risks of mobile devices to treat.
common precautions that were once on all your network devices may not be taken over. Here are some rules you must establish for BYOD devices so that you can reduce the risks associated with allowing mobile devices in your workflow.
Most passwords are terrible
This was discussed almost constantly on security blogs One worldwide, and it will be until 'password' is the default password used by so many people. And no, '123456' is not better!
The problem with mobile devices and BYOD is that emails can be easily hacked when poor password choices are made. A strong password policy should be encouraged, as well as two-factor authentication. He will come down to you educate your employees and giving them the tools to make these passwords. My go to the tool LastPass
application downloads Bad and rooted phones
We all like free applications, but some of they are not free. - I do not mean that you have downloaded freemium game! There are a growing number of apps out there, even on the Google Play and Apple App Store, which are built to be malicious.
Ensure that your employees take the time to search applications is your best approach. Send Reviews applications that were deemed harmful in email blasts, and start getting your security conscious team that way.
Rooting a phone is another common problem. Yes, it makes your phone easier to work with when it comes to applications and switching networks. But it also makes it easier for hackers to work with too. A policy against the rooted phones connecting to your network is an essential step to take to protect your business.
Mobile devices that are too old for updates
I'm not saying you should go out and buy a new mobile device each version, but the mobile devices that are too old for the new security updates are a threat to your business. These updates are not there for fun -. A large majority of them are working to prevent new threats that emerge every day
If all those who work with you using an old laptop running Windows XP yet, it's time to talk to them to make upgrade their operating system. Remember that it is for the benefit of your business - spend a few dollars if you need
poor data storage
Storing your data securely is vital. . There are a few ways to go about this:
- Store your data on a device that does not connect to the Internet. For those mobile devices that do, you can restrict access to the data centers and have dedicated workstations that do not connect to the Internet.
- Store your data offsite. The best way I've found to store data off-site is using a cloud provider. An additional layer of protection can be achieved using data storage VyprVPN and encryption functionality. This will encrypt your Internet connection, eliminating the man in the middle attacks, and keep your encrypted data while it is stored. Give mobile device using employee access to when they have to store data and you will be much safer.
Anyway, this will help minimize the attack points for hackers, and keep your most valuable data secure. The last thing you want to do is just leave important data on mobile devices or even on fixed workstations.
No to the screen lock using
This is one of the easiest risks of mobile devices to prevent most devices comes with this feature installed. Your business needs a screen lock policy to protect mobile devices that people think are safe as they walk away to the bathroom. Yes, 99% of the time you have a big security around your office, but it is on mobile devices that could end up anywhere.
Good policy will apply to all phones and tablets, but it can be applied just as easily to desktop workstations, you have all the time in your office. This can help prevent thieves from entering the company's data centers, and can prevent the child from your employee tweeting about nonsense about the company Twitter account!
Your mobile device risk in the future
There is no way for me or anyone else, to predict exactly what the next hacker attack will be. There is still no excuse for not having the basics above right, and minimizing the risk. Hacking is to have a number of vulnerable points of attack to the target. The above steps will help you minimize the points of attack and keep you safer, no matter what type of attack is next expected.
the entity image via LeoWolfert / Shutterstock
0 Komentar