Mobile Device Security Protection for SMBs

Thursday, November 3, 2011
Posted by Kyle Thompson

Mobile Security Protection for SMBs

Tips to Educate SMBs on Mobile Security

By David Eisner

According to a recent CompTIA study, 85 percent of small and medium-sized businesses (SMBs) said their employees use personal tech devices – laptops, smartphones or tablets -- for work.  As a result of this popularity, SMB IT professionals have serious security concerns about the use of these personal devices when connecting to organizations’ networks and storing company data (ie., emails, files, username/password information.)

While mobile devices allow for greater productivity and efficiency, employees must be educated on the potential security risks these devices can pose and how to best keep the devices and the information on them protected. Mobile devices have become extensions of PCs and have many of the same vulnerabilities.

Here are tips for SMBs and their employees to help keep the information on mobile devices protected:

  1. Create a Mobile Device Policy: A business’ IT managers should create a single    mobile policy for both corporate and employee-owned devices.
  2. Use Caution when Clicking: Users should not open unidentified links, chat with unknown people or visit unfamiliar sites. 
  3. Never Open Files Attached to Unexpected Text Messages from Unfamiliar Senders. Attackers can use text messages to spread malware, phishing scams and other threats. 
  4. Use Strong Passwords: Use strong passwords to help protect data stored in the phone and prevent data security breaches. Patching endpoints, performing vulnerability assessments, and enforcing corporate compliance are all part of effective endpoint security.
  5. Be Certain the OS is Up-to-Date: By keeping software up-to-date the device will be protected from security vulnerabilities that could threaten a company’s information. Install and run anti-virus, anti-spyware and firewall programs.
  6. Encrypt the Data: If a device is lost and the SIM card is stolen, the data will not be accessible if the proper technology is installed on the device. Consider setting up a remote wipe, which is “insurance” against theft or loss of the device.
  7. Backup Critical Information.  All critical information needs to be regularly copied to an alternate location.
  8. Do not Share Your Location: By sharing an exact location within GPS enabled apps, provides privacy and security concerns.
  9. Avoid Public WiFi: Avoid open (unsecure) WiFi hot spots.
  10. Automatically Lock the Phone: Configure the phone to automatically lock after being idle for a few minutes, and then require a password to unlock it.

About the Author:

David Eisner is the founder, president and CEO of Dataprise, Inc., a leading information technology managed services provider (MSP) that solves the technology challenges of small and medium-sized businesses.  Headquartered in the Washington, D.C. metro area and with offices from the mid-Atlantic to New York, Dataprise helps organizations manage their networks and make best use of their technology investments.  Dataprise offers extremely affordable technical support and consulting services, including its Support365TM monthly service plans, 24 x 7 help desk operations and the highest quality customer service.  For more information, visit www.dataprise.com