Working 9 to 5 on Mobile Security
I love watching old movies, like the classic “9 to 5” and realizing how antiquated the tools used in the workplace are. Rolodexes, typewriters and fax machines – oh my! While devices like these were the standard of their time, technology has evolved, bringing in new equipment that allows employees to be more efficient, but also brings about security concerns.
In the age of technology, there is a growing trend around Bring Your Own Device or BYOD, specifically with mobile devices in the workplace. Companies want employees to have the flexibility to use devices they’re comfortable with, but placing gadgets in the hands of employees can take a turn for the worse.
Security breaches happen, but often times, the source of a breach comes from an internal employee. Think about it. If you use your device (that has data from your work) to check your email and get caught up in a phishing scam or ransomware attack, your company information is exposed.
Most companies do as much as they can to keep their data secure, but what can you do as an employee to make sure you’re keeping yourself and your company safe from threats? Here are some strategies that can potentially reduce the risk of a mobile security breach:
- Ask questions: Think there’s something fishy or insecure on your phone? Talk to your IT department, they’ll be more than happy to help you stay secure.
- Pay attention: If your company has an internal training or guide to keeping your devices safe, tune in. As our devices evolve, so do security methods.
- Follow protocol: If you’re victim to attack, be sure to follow the directives of your IT team and alert them as fast as you can. A quick response to a threat can help to minimize the damage.
Of course, good mobile security hygiene wouldn’t be complete without simple best practices that you can implement every day:
- Multi-factor authentication: Keep your devices and your accounts (social media channels, emails, etc.) secure with an added layer of security.
- Complex passwords: It’s 2017, you know better than to have “password” or “1234” as a safeguard for your devices.
- Selective Wi-Fi: Avoid connecting to unsecure Wi-Fi, especially if you plan on connecting to an internal corporate system.
- Security, security, and security: Always use comprehensive security software to protect your personal devices. If your company provides you with a device, be sure to follow their directives on the type of security to load on your device.
More antivirus and malware news?
- Sony 2014 breach linked to $81m Bangladesh Bank cyber heist
- Politicians promise to lock kids out of online porn sites
- Was Microsoft’s takedown of Citadel effective?
- The Connected Home – Introducing Little Red Boxes…
- Companies must ‘take the fight to the criminals’ to tackle cybercrime
- How Amazon customer service was the weak link that spilled my data
- Regin: Sophisticated Malware, But Not Without Precedent
- Greatfire.org faces daily $30,000 bill from DDoS attack
- Dutch court sinks Pirate Bay proxy site
- New Open Source Ransomware Based on Hidden Tear and EDA2 May Target Businesses