The increasing reliance and availability of cloud applications for business processes coupled with the newly-remote workforce have led to a dramatic rise in a big security issue. [Read more…]
Social Phishing is on the Rise! 4 Ways to Keep Your Company Protected
When phishing first began, it was largely relegated to email. Attackers send millions of fake emails out trying to trick someone into clicking a malicious links or download and open a malware-laden file. [Read more…]
Why Ransomware as a Service (RaaS) Has Made This Type of Malware 10x Worse
Ransomware has been on the cybersecurity radar for several years now as one of the more dangerous forms of malware, but recent surges in attacks have pushed it front and center. [Read more…]
Is Your Company Ready to Try Virtual PCs? Introducing… Windows 365
In mid-July, Microsoft made a big announcement that could change the way that companies requisition their computers. It announced the release of a new cloud PC service called Windows 365. [Read more…]
How to Digitally Offboard Employees to Ensure Your Business Data Isn’t at Risk
The digital age has changed many things for business operations, and one of them is the employee offboarding process. [Read more…]
What Can You Learn from the 5 Top Cybersecurity Predictions for 2021
It’s been a rocky pandemic for companies trying to keep their technology systems secure. The need to facilitate work-from-home (WFH) employees at the beginning of the pandemic opened up a network security risk. Hackers quickly leveraged the disruption COVID caused and increased their attacks. [Read more…]
6 Important Ways to Prevent Cloud Jacking of Your Online Business Apps
Cloud security is becoming a major concern for companies of all sizes. Over the last 18 months, 79% of surveyed businesses have experienced a cloud data breach. [Read more…]
Learn All the New Features Coming Later This Year with Windows 11
Microsoft just came out with a major new announcement recently. More than five years after Windows 10 launched, it has announced the next iteration of the Windows operating system. [Read more…]
Why You Should Start Using a Zero-Trust Approach for Your IT Security
Many companies find out the hard way that business IT security is never fully “done.” As soon as you implement safeguards against today’s threats, tomorrow, hackers will come up with new and inventive ways to break into company networks. [Read more…]
5 Important Ways to Safeguard Mobile Devices from Online Threats
Verizon recently released its Mobile Security Index 2021 report, which provides details on the current state of mobile device security risks and the types of attacks companies should be prepared for.
The report illustrates the shift towards more mobile working and the fact that the security of smartphones and tablets hasn’t yet caught up to that of PCs. While offices are becoming more dependent upon mobile devices, those devices are creating more risk for business networks if not properly secured.
According to the report, 71% of surveyed organizations say that mobile devices are “very critical to their business” and 53% said their company has suffered major consequences in the past from a mobile-device-related security incident.
40% of surveyed professionals say mobile devices have become the biggest IT security threat.
While mobile devices are gaining more prominence at work, hackers have noticed and have been unleashing more mobile-specific attacks, such as banking trojans and spyware hidden inside mobile apps.
Businesses need to realize that users are now doing the same things and accessing the same sensitive data via mobile as they do computers. This means that smartphones and tablets (both company-owned and employee-owned) need to have the same strong protections as PCs.
Tactics for Keeping Mobile Devices from Being a Security Problem
Require Use of Lock Screen
One big risk with mobile device security is that phones and tablets are easily lost or stolen. If a thief gets their hands on a smartphone used for work, they could easily access platforms that have a persistent sign-in (always keep you signed in). They also have access to any text or app-based multi-factor authentication, which could give them access to multiple cloud and website accounts.
Using a lock screen might mean a few more seconds to unlock a device, but it can also give you time to remotely lock or wipe a device should it be lost. That can make all the difference between a major data breach happening due to a lost device and being able to lockdown information before it’s compromised.
Use a Business VPN
Between 2018 and 2020, the number of global public Wi-Fi hotspots has increased 63% to 454 million. As mobile phones are being carried around, they can be connecting to any number of public, unsecured networks.
Public networks hold a big security risk for a man-in-the-middle attack when a hacker is on the same public network and using special tools to spy on the activity of other users.
Adding a business VPN is one of the important tools in any cybersecurity checklist. Once signed up, you can add your employees, have them download a mobile app, and it will secure their internet traffic through encryption. This keeps the data secure, even when on public Wi-Fi.
Keep Track of Mobile Devices with a Mobile Device Manager
Mobile devices now make up about 60% of the endpoints in a company. They can be connecting to your business data from any location and that location often changes throughout the day.
Mobile device managers, such as Microsoft Intune, give companies a way to secure the business side of employees’ devices.
An MDM enables remote monitoring and administration for:
- Which devices can connect to your business apps
- OS and software updates
- Locking or wiping a lost or stolen device
- Enforcement of IT security policies consistency across all devices
Research Apps Before Downloading Them
Employees should be instructed not to download any apps from outside a legitimate app store (Apple, Google, Microsoft). But even when downloading from an app store, it’s important to research an app online first to ensure it’s not a fake with hidden malware or one that overshares data.
Even fake apps can end up in a legitimate app store for a while before they’re found out and removed by the platform. Mobile malware has been increasing as the use of mobile devices at work has risen.
Employees need to be aware of the security of any new apps they install before they install them, and the fact that some malicious apps will actually hide their icon after being installed to make removal more difficult.
Install a Mobile Antivirus/Anti-Malware App
PCs aren’t the only device that needs an antivirus/anti-malware application, it’s also important to have one protecting business-use mobile devices.
All mobile devices used for business use, even if it’s just to receive work email, should have a reliable mobile version of an antivirus/anti-malware application. This helps ensure any infections are caught before they cause major problems and travel through your network to other devices.
Get Help Implementing a Mobile Device Security Plan
Pro Tech Guy can help your Framingham business put a cost-effective mobile device security plan in place to ensure your company data isn’t at risk.
Contact us today to learn more. Call 508-364-8189 or reach us online.
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 17
- Next Page »