Many of us are using our smart devices (phones, tablets etc.) not only as a communication tool, but as a mean to plan and organize our work and time spent. Hence these smart devices become new levels of I.T. security risks if these smart devices have access to and store personal and company sensitive information.
So keep in mind the following mobile security practices.
- Keep your mobile devices with you at all times or store them in a secured location when not in use. Do not leave your mobile devices unattended in public locations (e.g. airport lounges, meeting rooms, restaurants, etc.)
- Mobile devices should be password protected and auto lockout should be enabled. The password should block all access to the device until a valid password is enabled. The password used should be as strong a password as your device will support
- Enable a “remote wipe” feature if available. This also includes features that delete data stored on the mobile device if a password is not entered correctly after a certain number of specified tries.
- Do not circumvent security features or otherwise “jailbreak” your mobile device.
- Standard security protocols should be followed. This includes ensuring your device has current anti-virus software and all operating system and application updates and patches. Firewalls should be enabled if possible.
- Wipe or securely delete data from your mobile device before you dispose of it.
- Lost, stolen, or misplaced mobile devices should be immediately reported to the police.
- Wireless access, such as Bluetooth, Wi-Fi, etc., to the mobile device should be disabled when not in use to prevent unauthorized wireless access to the device.
- Do not install software from unknown sources as they may include software harmful to your device. Research the software that you intend to install to make sure that it is legitimate.
Mobile Security Tips
Comments