Working 9 to 5 on Mobile Security
I love watching old movies, like the classic “9 to 5” and realizing how antiquated the tools used in the workplace are. Rolodexes, typewriters and fax machines – oh my! While devices like these were the standard of their time, technology has evolved, bringing in new equipment that allows employees to be more efficient, but also brings about security concerns.
In the age of technology, there is a growing trend around Bring Your Own Device or BYOD, specifically with mobile devices in the workplace. Companies want employees to have the flexibility to use devices they’re comfortable with, but placing gadgets in the hands of employees can take a turn for the worse.
Security breaches happen, but often times, the source of a breach comes from an internal employee. Think about it. If you use your device (that has data from your work) to check your email and get caught up in a phishing scam or ransomware attack, your company information is exposed.
Most companies do as much as they can to keep their data secure, but what can you do as an employee to make sure you’re keeping yourself and your company safe from threats? Here are some strategies that can potentially reduce the risk of a mobile security breach:
- Ask questions: Think there’s something fishy or insecure on your phone? Talk to your IT department, they’ll be more than happy to help you stay secure.
- Pay attention: If your company has an internal training or guide to keeping your devices safe, tune in. As our devices evolve, so do security methods.
- Follow protocol: If you’re victim to attack, be sure to follow the directives of your IT team and alert them as fast as you can. A quick response to a threat can help to minimize the damage.
Of course, good mobile security hygiene wouldn’t be complete without simple best practices that you can implement every day:
- Multi-factor authentication: Keep your devices and your accounts (social media channels, emails, etc.) secure with an added layer of security.
- Complex passwords: It’s 2017, you know better than to have “password” or “1234” as a safeguard for your devices.
- Selective Wi-Fi: Avoid connecting to unsecure Wi-Fi, especially if you plan on connecting to an internal corporate system.
- Security, security, and security: Always use comprehensive security software to protect your personal devices. If your company provides you with a device, be sure to follow their directives on the type of security to load on your device.
More antivirus and malware news?
- Decision to buy cyber insurance usually leaves CIO, CISO out of the loop: survey
- A hacker wants to sell 10 million patient records on the black market
- Mozilla hits Microsoft with complaint about Windows RT browser choices
- Digital watermark leads police straight to Bollywood pirates
- Microsoft .NET Framework CVE-2012-4777 Remote Privilege Escalation Vulnerability
- Robocalling Firm Exposes U.S. Voter Records
- Ten scary hacks I saw at Black Hat and DEF CON
- Planning for a disease outbreak? There’s a game for that
- Cyber Threat Intelligence and the Market of One
- Bill to rein in NSA phone data collection reintroduced