Skip to main content
Skip to footer
Computing on a Budget: Three Mobile-Security Tips | Business Hub | Staples.com®

Computing on a Budget: Three Mobile-Security Tips

Lock down your mobile devices without emptying your wallet. Here’s our advice for improving mobile security.

In the scramble to control costs, small businesses shouldn’t skimp on security. Protecting your technology, especially for mobile devices, can prevent a range of tech issues in the future.

For creating a big-corporation security policy on a small-biz budget, follow these three simple tips:

Tip #1: Employ Endpoint Encryption

Think of encryption as the protections in your house. First, there’s the front door and the back door, which are the main security barriers. But then you also lock the windows and perhaps keep a fireproof safe for important documents.

Similarly, encryption offers layer upon layer of security to make sure data stays safe. “Endpoint encryption” describes the controls employed at the user/endpoint level, which can include:

•    Full drive encryption for a laptop, to make sure it’s protected in case of theft or loss

•    File-folder encryption to protect data on a shared system, especially if several people share an environment (e.g., a cloud-based workspace)

•    Email encryption to protect messages and attachments

All of this encryption can work together, keeping a system secure and providing multiple levels of protection. Also, many of the tools and strategies are affordable, giving you robust security without busting your budget.

Tip #2: Take Advantage of Free Tools

Many security resources are available online. (As a first step, make sure a company is legit — some hackers use fake security programs to crack into a network or device.) Then, decide which of these options might be right for you:

•    System scanners that identify potential security issues inside your network or computer

•    Spyware killers that can cleanse a system

•    Attack-detection apps that determine whether your company website is under attack or being monitored by hackers

•    End-user license agreement (EULA) scanners that crawl through these documents on your computer to see if any hackers have tweaked a EULA to gain entry into your system

These resources are handy, tested and free or at least affordable (some shareware developers ask for a small donation). Take advantage of the breadth of tech savvy available to make your business more bulletproof.

Tip #3: Implement Budget-Friendly Employee Policies

Many companies are finding success with implementing a BYOD (bring your own device) policy, which allows employees to use their own smartphones, laptops and tablet computers at the office.

Because employees purchase the devices, the cost benefits are tough to beat. Where you should put your tech dollars, then, is into security measures that protect the network when these devices are logged on. Here are some tips:

•    Develop an employee security policy that mandates encryption on all devices and prohibits installation of applications that might compromise security

•    Talk to employees about the importance of password-protection strategies.

•    Conduct occasional device audits to make sure they don’t carry security risk.

•    Prohibit storage of company data on the devices; often, employees can access files from cloud-based services without downloading and storing them locally.

With BYOD policies, free tools and endpoint encryption, you’ll be on your way to having an efficient, affordable mobile-security program.

blog comments powered by Disqus
We welcome your comments about the articles on the Staples Business Hub. Please follow these simple rules when submitting your comments: Do not mention our competitors, the price you paid for products, URLs, or your personally identifiable information (such as your full name or address). Be considerate and courteous. Do not attack or insult other users, use violent language, or engage in name-calling. These types of comments will be removed. Our moderation team may read comments before they are displayed.