Nearly every survey and article on information security during the last 12 months have one common baseline : “Organisations are concerned about Mobile Security”.
In a recent survey of 100 UK businesses with annual revenue of over $25 million, the 2013 AT&T Business Continuity Study found that 83 percent of executives are concerned about the use of mobile networks and devices and its impact on security threats.
Various surveys indicate that though Smartphones and Tablets are everywhere, the majority of users aren’t aware of the importance of mobile security, or how to best protect themselves.
How much time do we spend considering the security of our tablet or mobile phone? We’re not talking about just making sure the screen lock is enabled, but protecting against viruses and ensuring that our information is secure.
There is little doubt that mobile devices have completely transformed today’s business world, with organisations now commonly making line-of-business applications accessible to their increasingly mobile workforce. Smartphones and tablets are now being used by hundreds of millions of employees worldwide to access, transmit and store corporate information in today’s 24/7 business environment.
There are the three critical areas in which mobile data must be protected without disrupting user productivity:
(1) Email applications which contain sensitive information and are subject to regulatory compliance
(2) Sensitive business files and documents
(3)Transaction data captured by new mobile payment methods
The key factor that pushes mobile security to the criticality-stage is that mobile devices are inherently insecure. Devices can be easily lost or stolen, information can be stolen over wireless networks, mobile malware is spreading rapidly, and most device users are often uneducated about risks and how to secure devices.
Here are some tips to secure your mobile gadgets:
1. Use password protected controls
2. Control wireless network and service connectivity – if you do not need regular data access, disable data connectivity and enable it only when needed.
3. Control application access and permissions – most apps that are downloaded details the permissions required by the app. But by default we blindly accept the permissions since we do not know the full implications. It is worthwhile to regularly review the various permissions that have been granted across all apps.
4. Keep your OS and firmware current – Since most mobile OS have frequent security updates, ensure that your OS is the most recent version.
5. Back up your data – ensure that your data is backed up. There are many free and paid software which will sync your data to the cloud or your PC.
6. Wipe devices data automatically if lost or stolen – there are many apps that enable you to wipe the device data remotely if the device is lost. There are also some new apps that will enable wiping data by just sending an sms to your device which would work even if data connectivity is not present.
7. Never store personal financial data on your device
8. Beware of free apps
9. Try mobile antivirus software of scanning tools
10. Record the IMEI number – the IMEI number helps your mobile operator to block the phone if it is lost.
Comments are closed.