Working 9 to 5 on Mobile Security
I love watching old movies, like the classic “9 to 5” and realizing how antiquated the tools used in the workplace are. Rolodexes, typewriters and fax machines – oh my! While devices like these were the standard of their time, technology has evolved, bringing in new equipment that allows employees to be more efficient, but also brings about security concerns.
In the age of technology, there is a growing trend around Bring Your Own Device or BYOD, specifically with mobile devices in the workplace. Companies want employees to have the flexibility to use devices they’re comfortable with, but placing gadgets in the hands of employees can take a turn for the worse.
Security breaches happen, but often times, the source of a breach comes from an internal employee. Think about it. If you use your device (that has data from your work) to check your email and get caught up in a phishing scam or ransomware attack, your company information is exposed.
Most companies do as much as they can to keep their data secure, but what can you do as an employee to make sure you’re keeping yourself and your company safe from threats? Here are some strategies that can potentially reduce the risk of a mobile security breach:
- Ask questions: Think there’s something fishy or insecure on your phone? Talk to your IT department, they’ll be more than happy to help you stay secure.
- Pay attention: If your company has an internal training or guide to keeping your devices safe, tune in. As our devices evolve, so do security methods.
- Follow protocol: If you’re victim to attack, be sure to follow the directives of your IT team and alert them as fast as you can. A quick response to a threat can help to minimize the damage.
Of course, good mobile security hygiene wouldn’t be complete without simple best practices that you can implement every day:
- Multi-factor authentication: Keep your devices and your accounts (social media channels, emails, etc.) secure with an added layer of security.
- Complex passwords: It’s 2017, you know better than to have “password” or “1234” as a safeguard for your devices.
- Selective Wi-Fi: Avoid connecting to unsecure Wi-Fi, especially if you plan on connecting to an internal corporate system.
- Security, security, and security: Always use comprehensive security software to protect your personal devices. If your company provides you with a device, be sure to follow their directives on the type of security to load on your device.
More antivirus and malware news?
- 4 Interview questions for data security analysts
- Adobe, now ‘married’ to Microsoft, moves Flash updates to Patch Tuesday
- Mac Crashing Malware Distributed in Tech Support Scam
- Library service interruption, Tuesday, 9/25/2012
- Spammers abuse .gov URL shortener service in work-at-home scams
- Microsoft Internet Explorer CVE-2015-1731 Remote Memory Corruption Vulnerability
- U.S Awards Cyber Attack Prediction Program Contract to BAE Systems
- Are you ready for a second wave of WannaCry ransomware?
- Dream Team Talks about Corona and More at #HITB2012AMS [VIDEO]
- Unix: Book Review — Absolute OpenBSD: Unix for the Practical Paranoid by Michael W. Lucas, Open Starch Press, 2013