Cyber Security for Mobile: 3 Considerations
If your company hasn’t prioritized a cyber security for mobile plan, it may be time to push for better protection. Mobile devices, such as laptops, tablets, and smartphones, are more likely to be lost or stolen and to access unsecured WiFi.
Mobile devices are valuable tools for any modern business, allowing employees to improve productivity by creating consistent work experiences no matter where the location or time. But their convenience also comes with some risk, and companies must have protections in place to secure data and systems. There are several factors you should keep in mind when planning a mobile device security plan:
Corporate-Owned vs. BYOD: The first big decision any company must make is whether to buy devices for their employees to use or allow employees to use their own in a bring-your-own-device (BYOD) program.
Some organizations like the control that comes with a corporate-owned device program because you can have a high level of monitoring and tightened policies. The downside is that corporate-owned devices carry a high expense. In addition, employees may arrive at your organization with their own device, and many prefer not to monitor two separate sets of devices for business and personal use. Some companies opt for a corporate-owned, personally-enabled approach that gives more flexibility to employees on how they use devices.
BYOD programs are easier on corporate budgets, but they are much more difficult to secure. If you go this route, it’s important to implement some key cyber security for mobile policies – including terms of device use and mobile policy, which may also utilize some guidelines for OS and app updates, plus policies around cost sharing. Overall, a BYOD program forces employees to accept a certain level of device control, while companies may lower security protocols just a bit to ensure employee agreement.
Mobile-Specific Risks: Mobile devices are at risk for a wider variety of attacks, yet a mobile device security plan may be low on the priority list. Devices can be stolen or lost, they may access an unsecured WiFi, and because mobile devices are often utilized in a multi-tasking scenario, an app may be downloaded or a phishing email opened without adequate attention by the user. For instance, a phishing email that may catch a person’s attention while sitting at a desk may be mindlessly clicked through while tossing groceries into a cart.
Elements for an Effective Policy: Creating a solid cyber security for mobile plan requires the specific steps to secure devices as well as training and communication so that employees take ownership of security concerns. A plan should include the following:
- • Acceptable use device
- • Ownership policy
- • Privacy guidelines
- • An outline of what data the company can view
- • Security and management tools disclosure
- • Measures to be taken if a device is compromised or must be remotely locked
If your organization is considering a change to your cyber security for mobile, contact us at One Connect. We can help you determine a plan to maximize employees’ productivity and satisfaction while protecting your data and systems.