Computing on a Budget: Three Mobile-Security Tips
Lock down your mobile devices without emptying your wallet. Heres our advice for improving mobile security.
In the scramble to control costs, small businesses shouldnt skimp on security. Protecting your technology, especially for mobile devices, can prevent a range of tech issues in the future.
For creating a big-corporation security policy on a small-biz budget, follow these three simple tips:
Think of encryption as the protections in your house. First, theres the front door and the back door, which are the main security barriers. But then you also lock the windows and perhaps keep a fireproof safe for important documents.
Similarly, encryption offers layer upon layer of security to make sure data stays safe. Endpoint encryption describes the controls employed at the user/endpoint level, which can include:
Full drive encryption for a laptop, to make sure its protected in case of theft or loss
File-folder encryption to protect data on a shared system, especially if several people share an environment (e.g., a cloud-based workspace)
Email encryption to protect messages and attachments
All of this encryption can work together, keeping a system secure and providing multiple levels of protection. Also, many of the tools and strategies are affordable, giving you robust security without busting your budget.
Many security resources are available online. (As a first step, make sure a company is legit some hackers use fake security programs to crack into a network or device.) Then, decide which of these options might be right for you:
System scanners that identify potential security issues inside your network or computer
Spyware killers that can cleanse a system
Attack-detection apps that determine whether your company website is under attack or being monitored by hackers
End-user license agreement (EULA) scanners that crawl through these documents on your computer to see if any hackers have tweaked a EULA to gain entry into your system
These resources are handy, tested and free or at least affordable (some shareware developers ask for a small donation). Take advantage of the breadth of tech savvy available to make your business more bulletproof.
Many companies are finding success with implementing a BYOD (bring your own device) policy, which allows employees to use their own smartphones, laptops and tablet computers at the office.
Because employees purchase the devices, the cost benefits are tough to beat. Where you should put your tech dollars, then, is into security measures that protect the network when these devices are logged on. Here are some tips:
Develop an employee security policy that mandates encryption on all devices and prohibits installation of applications that might compromise security
Talk to employees about the importance of password-protection strategies.
Conduct occasional device audits to make sure they dont carry security risk.
Prohibit storage of company data on the devices; often, employees can access files from cloud-based services without downloading and storing them locally.
With BYOD policies, free tools and endpoint encryption, youll be on your way to having an efficient, affordable mobile-security program.