Story image

Top tips for protecting business data on mobile devices

01 Feb 12

Businesses have an obligation to take reasonable security measures to ensure the integrity of sensitive private data – no matter where it may be stored or how it may be accessed.  Symantec offers some advice to help IT execs on top of security issues.
Establish policies for BYO devices. If employees are able to use their own devices to access the organisation’s network, then your organisation needs policies around which devices and what information they can access. Procedures for loss or theft of devices should also be in place. Policies must be communicated to all employees. 
 


  1. Encryption is a great tool for protecting data on mobile devices. Utilise it to secure data such as contact names and numbers as well as emails and email attachments. Email encryption should happen automatically on a mobile device for instant protection of sensitive information over all the networks it may cross.
     

  2. Mobile devices should have mobile-specific security software that includes firewall and antivirus. Protection should span the variety of attack vectors that can impact mobile devices such as MMS, infrared, Bluetooth and email.
     

  3. Educate employees on the importance of protecting their devices. Most best practices are common sense: Don’t leave your mobile device lying around for others to pick up or keep it in your sight at all times. Forgetting a mobile device on a bus or train could have damaging consequences for a business.
     

  4. Take an information-centric approach to IT security. This means focus on managing the data from the data centre to the endpoint (be it smartphone, laptop, tablet, USB or some other device) and from the desktop to the cloud.
     

  5. User authentication is important. Make sure users have password protection on their devices so that it can only be accessed by a legitimate user.
     

  6. Users should be aware of their surroundings when accessing sensitive information. Because mobile devices are portable, they get used everywhere. When viewing sensitive or confidential data, be cautious of who might be looking over your shoulder.
     

  7. Don’t allow jailbroken or rooted devices to be brought into the organisation. Tampering with the operating system makes the devices more susceptible to mobile threats.
     

  8. Take inventory. You can’t protect or manage what you can’t see. You must take inventory of the devices in your organisation to gain visibility across multiple networks and into the cloud. After taking stock, implement continuous security practices, such as scanning for the latest security software, operating system patches and hardware information, such as model and serial number.
     

  9. Stay flexible. Threats that target mobile devices are the same for small businesses and enterprises. As businesses grow, they require security management technology that is automated, policy-based and scalable so that the infrastructure can accommodate new mobile platforms and services as they are introduced


  10.  
Vertiv reveals new ‘plug-and-play’ data centre options
The new product families are said to enable the rapid deployment of right-sized, just-in-time data centre and power capacity.
Fujitsu takes conservation prize for immersion cooling system
The prize was awarded for the Fujitsu Server PRIMERGY Immersion Cooling System that can reduce power consumption by up to 40%.
5G will propel RAN market to $160b in near future
5G growth is expected to advance at a faster pace than LTE, particularly within the APAC region.
Expert comment: Google fined US$57mil for GDPR breaches
The committee examining the breaches found two types of breaches of the GDPR.
Liquid cooling key to silencing a noisy data centre
Data centre are famous for being very noisy, but Schneider Electric's Steven Carlini says liquid cooling infrastructure could change that.
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat
DigiCert's QuoVadis acquisition extends PKI expertise in EU
DigiCert has now officially completed its acquisition of QuoVadis Group from Swiss security firm WISeKey International.
Commvault fully integrates backup with Cisco Hyperflex
Its IntelliSnap technology has been validated to work with Cisco HyperFlex hyper-converged systems without the need for third-party tools.