Skip to content

Did you forget this critical device in your cybersecurity planning?

5 steps for a mobile security plan

Arthur Gaplanyan

No Comments

Mobile Security

How long has it been since you looked at your phone? Maybe you’re even reading this on your phone.

We use them constantly, there’s no surprise there. So just think of the fingerprints you leave all over the place with them.

If somebody looked at your phone, they’d probably see a good chunk of your personal details without much issue. Banking details, private messages, photos, not to mention all your contacts.

What about your work? If you use your phone for work then it probably has direct access to company data. File systems, network access, emails, and contact information.

That’s why mobile phones need to be kept as secure as every other device on the company network. If they aren’t, and companies often overlook them, then it’s a gaping hole in your cybersecurity.

Of course, this weakness isn’t unknown to criminals. That’s why so many attacks are directed towards phones, emails that are harder to detect as fake on a phone, or through SMS text messages (otherwise known as Smishing).  That’s not even considering the implications of a physically lost or stolen phone.

That’s why when mobile devices are used by your company, those devices should be factored into your cybersecurity and BYOD policies. Ensuring that every device is covered by your cybersecurity can easily help protect your company and its data.

Here are the 5 basic steps for a mobile security plan:

Ensure that every device is protected with a login.

That could be a pin, swipe pattern, fingerprint scan, or even face recognition. The details between these options are splitting hairs, so let people choose their preference. Just making sure one is in use on every device is the critical issue.

Only install apps from trusted sources.

Using the app store helps weed out malicious apps because Apple and Google do a good job at ensuring apps are clean. No, it’s not a perfect system, but it is a lot simpler and more trustworthy than downloading from some random internet source.

Enable MFA on all apps

If your app uses any sensitive data at all, you should protect it. Implementing MFA in any form (not all MFA forms are created equally) will greatly reduce the risk of a data breach.

Be careful of Wi-Fi

If you’re on the go frequently, finding a Wi-Fi spot is like an oasis in the desert. You get increased speeds and don’t eat into your data package. The bad news is that connecting to a public network is highly dangerous. Your data isn’t protected at all and can easily be intercepted. If you need to connect to a public network, consider using a Virtual Private Network. A VPN app can add a layer of security to your device, and more importantly to the data you are transmitting to and from it.

Update for crying out loud!

I know, updates are annoying and they seem to pop up at the most inconvenient times. Don’t dismiss them though. They bring critical security patches that your device needs. If now really isn’t a good time, make sure to schedule it to update later. Most phones can do this so the update can be done while you are not actively using the phone.

Don’t take your smartphone for granted. They have become so ingrained in our lives we often overlook the vast amount of data we process through them. If we ignore security, then that can be a very expensive mistake.

If you need assistance with setting up security measures on your devices or creating a mobile policy for your business then feel free to schedule a free consultation.