itb-nz logo
Story image

Top tips for protecting business data on mobile devices

01 Feb 2012

Businesses have an obligation to take reasonable security measures to ensure the integrity of sensitive private data – no matter where it may be stored or how it may be accessed.  Symantec offers some advice to help IT execs on top of security issues. Establish policies for BYO devices. If employees are able to use their own devices to access the organisation’s network, then your organisation needs policies around which devices and what information they can access. Procedures for loss or theft of devices should also be in place. Policies must be communicated to all employees.   

  1. Encryption is a great tool for protecting data on mobile devices. Utilise it to secure data such as contact names and numbers as well as emails and email attachments. Email encryption should happen automatically on a mobile device for instant protection of sensitive information over all the networks it may cross.  
  2. Mobile devices should have mobile-specific security software that includes firewall and antivirus. Protection should span the variety of attack vectors that can impact mobile devices such as MMS, infrared, Bluetooth and email.  
  3. Educate employees on the importance of protecting their devices. Most best practices are common sense: Don’t leave your mobile device lying around for others to pick up or keep it in your sight at all times. Forgetting a mobile device on a bus or train could have damaging consequences for a business.  
  4. Take an information-centric approach to IT security. This means focus on managing the data from the data centre to the endpoint (be it smartphone, laptop, tablet, USB or some other device) and from the desktop to the cloud.  
  5. User authentication is important. Make sure users have password protection on their devices so that it can only be accessed by a legitimate user.  
  6. Users should be aware of their surroundings when accessing sensitive information. Because mobile devices are portable, they get used everywhere. When viewing sensitive or confidential data, be cautious of who might be looking over your shoulder.  
  7. Don’t allow jailbroken or rooted devices to be brought into the organisation. Tampering with the operating system makes the devices more susceptible to mobile threats.  
  8. Take inventory. You can’t protect or manage what you can’t see. You must take inventory of the devices in your organisation to gain visibility across multiple networks and into the cloud. After taking stock, implement continuous security practices, such as scanning for the latest security software, operating system patches and hardware information, such as model and serial number.  
  9. Stay flexible. Threats that target mobile devices are the same for small businesses and enterprises. As businesses grow, they require security management technology that is automated, policy-based and scalable so that the infrastructure can accommodate new mobile platforms and services as they are introduced
  10.  
Story image
A winning proposition for critical infrastructure
When is a surveillance system more than a surveillance system? When it not only protects an organisation’s premises but also supports efficient, reliable operations, and health and safety.More
Story image
Nuance revamps AI authentication to protect seniors from fraud
The tool utilises intelligence voice detection capabilities to let enterprises identify if callers are over the age of 65 and, if so, prioritise their call, get them to a live agent for service and better protect them from fraud.More
Link image
Kubernetes Explained! New Video - how it works and business benefits
With the rapid growth in multi-cloud use internationally, watch this video to find out why Kubernetes is becoming vital to New Zealand businesses, brought to Aotearoa by home-grown Catalyst Cloud.More
Story image
What happens when you run Linux on a toaster?
Just because you can build a toaster that runs Linux, it doesn’t mean you should.  So why are you using commodity hardware in your data centre that was built to do something else entirely?More
Story image
Over half of IT pros prefer hybrid and multi-cloud architectures - report
Denodo surveyed executives from over 250 organisations on their attitudes toward cloud, the challenges it presents, and the way in which it has changed workflows within organisations.More
Link image
OSS Group helps businesses use IT Automation to unify people & processes
if it exists in IT there is usually a way to automate it. Whether you're a director or systems engineer, those that understand automation can achieve a more streamlined and secure business.More