How to Reduce Smartphone Security Risks
There are a number of ways a company can cope with the employee-owned device challenge. The biggest decision is the level of support your company is willing to offer to non-company-owned devices and the means by which they access data.
In many cases, employees with their own devices are only permitted access to corporate email. This requires a fairly low level of support, as most smartphones have ActiveSync capabilities and can easily be configured by the end user.
In other cases, employees are permitted access to business data (besides email) but are not provided technical support through the IT helpdesk. They are mostly left on their own to resolve their issues. Yet other companies allow full data access with a full level of IT support.
The method of data access can sometimes drive the level of support. In the case of client/server data access, most companies prefer that devices be company-owned and company-supported due to the need for greater support. However, if employees use a Web portal to access company data, the degree of support needed is much less, simply because there is no complex software running on the end user's device.
Understand Your Security Options
Although security is always a challenge in small business, you have many options for keeping employee-owned mobile devices protected. With the advent of mobile VPN and mobile security suite products, your business can implement security with relative ease. There are also companies, such as Cbeyond, that offer mobile security products and can assist in implementation.
Look for Certain Features
Features such as device lock, wipe and “phone home” (which sends a stealth message from a lost or stolen phone to aid in tracking) capabilities are popular in mobile security today. If your company is using Microsoft Exchange for email, password protection can be enabled, requiring end users to enter a password before accessing their email. With a hosted Microsoft Exchange product, security can be enabled and enforced through the cloud.
When an employee using his or her smartphone for business leaves the company, once that employee account is removed from the Exchange server, he or she will no longer have access to a corporate email account, which secures all the data stored in that mailbox. If using password protection, the employee's credentials are revoked and he or she is unable to log in to the server.
The business world -- small, medium and large -- is making the transition toward employee-owned devices and away from company-supplied ones, primarily due to the associated expense. The best steps any business owner can take is to use password protection for data and email access and implement device security measures so that if a smartphone or tablet is lost or stolen, data can be secured or erased. And offer at least a certain level of technical support to ensure users can work as efficiently as possible and don't become frustrated with the technology. It is there to make a worker more productive, not to cause extra stress.
- The New Mobile Landscape
- Is Free Public Wi-Fi Safe?
- Keep Your Data Safe When Telecommuting
- Security Issues for Multicore Processors
- How to Reduce Smartphone Security Risks
- Are You Too Snarky Online?
- Who's Gawking at Your Photos?
- Is Social Media a Waste of Time?
- 5 New Ways to Feed Your Online Addiction
- Investors Increasingly Tap Social Media for Stock Tips
- McAfee's Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy
- A Game Plan for Protecting Stored Data
- Think Big When It Comes to Data Breaches
- Information Security MBA's Teach Business Side of Cybersecurity
- Apple Predicts 'Death of the Big Backpack' with New iPad Textbooks
- FBI Wants to Monitor Social Media for 'Emerging Threats'
- Youth on the Web: Reason? Who Needs a Reason
- Google Unveils 'Find My Face' Recognition Tool
- Why Investors Should Keep Their Eyes on the Cloud
- 10 Ways to Stay Safe While Shopping Online
- Take Advantage of Free Shipping Deals This Holiday Season
- Online Shopping Deals Hurt State Budgets
- Tips for Shopping With Your Smartphone
- Seven Rules of Successful Bloggers
- Twitter Redesigns Site, Aims for Simplicity
- 3 Ways to Use Foursquare to Connect With Your College
- United States Reacts to Indian Government's Efforts to Censure Online Content
- Will Apple Be the Same Without Steve Jobs?
- Steve Jobs: 6 Secrets of Success
- Open Clouds
- The Cloud: A Security Solution for Small Business
- 4 Twitter Tips for Business Success
- Twitter: How to Tweet to Get Results
- 3 Sneaky New Online Scams to Avoid
Copyright © 2012 Studio One Networks. All rights reserved.