Securing Mobile Devices

Netbooks, tablets and smartphones are convenient and easy to use. These mobile computing devices can store a large amount of private and sensitive information. Because they are highly portable, these devices are easy to steal and misplace. Unless precautions are implemented, unauthorized individuals can gain access to the stored information if the device is lost or stolen. It may be possible to capture data transmitted over an unencrypted Wi-Fi connection. Malware accidently downloaded to the device may be uploaded to your San Diego area company server inadvertently, enabling unauthorized third party access.

It is essential that individuals do not store unnecessary sensitive information on mobile devices. Prohibited data should be deleted as quickly as possible when no longer required. The device should be password protected and require authentication prior to accessing the network. Set a minimum idle time that automatically locks the device when not in use. Do not “jailbreak” the device. This removes malware protection installed by the manufacturer.
Ensure all firewall and anti-virus software is up-to-date and individuals follow established protocols before downloading apps and other software from only trusted sources onto their mobile device. These security protocols are especially critical if your San Diego area company supports a Bring Your Own Device (BYOD) policy. Employees must understand that, even though it is a personal device, it also interfaces with the company network.