How to secure your business smartphone in 5 minutes
How much company data do you store on your smartphone? How much company data do your employee’s store on their smartphones?
When it comes to mobile device security, it’s usually an afterthought. However more company data and business are now being done on mobile devices than ever before.
You’ll learn in the next 5 minutes some of the easiest things you can do to secure your company smartphones.
Most modern phones have basic security settings inbuilt now. Things like fingerprint/face ID are standard, but there are some settings that can be easily overlooked.
Make sure you turn on find my device and device encryption as standard. If a mobile device gets into the wrong hands and a device does not have encryption the contents can easily be read using simple tools.
Invest in Mobile Device Management (MDM)
If your current IT provider has not mentioned this to you already, it is a must for any size business. Mobile device management (MDM) allows your IT provider to manage all devices in your company, similarly how they may already be managing your pc’s and servers.
There are many features that MDM offers and we don’t have time to list them all here, but below are GKM2’s top 3 when it comes mobile device management.
If a device is lost or stolen it can easily be locked and tracked. You can also go as far as sending a remote wipe or even re-setting the pass-code to ensure corporate data safety.
Manage, Deploy and Log:
With MDM, you have the ability to capture device information such as IMEI and Serial Numbers, model number and OS version. You can also deploy applications, create Wi-Fi and VPN profiles. All this data and information is fantastic from both a regulatory point of view and for managing devices on a day to day basis.
Security Enforcement and preventing Data loss:
MDM allows the business to enforce strict security policies on the device. As an example, you can turn on features such as enforcing fingerprint ID or locking the phone if too many attempts have been made at guessing the PIN.
You can even maintain data integrity on devices by separating company work profiles from personal profiles.
If you don’t have an MDM solution for your business or are unclear of what you may have then schedule a security audit with us. Contact me direct on LinkedIn or email me for more information; firstname.lastname@example.org
Lost and stolen devices?
Do you have a transparent process if your CEO has their device stolen or lost?
Picture the worst thing that could happen to your company mobiles. Maybe one day the CEO drops their phone in the back of a taxi.
What do you do? What does your IT company do?
Well, it’s better to be prepared for the worst, so the first thing I’d suggest is having a transparent process of action if a device is lost or stolen.
1) Send a remote wipe using MDM.
2) Inform the network provider of the theft and get them to block the sim card.
3) Have a replacement device on standby and ready
4) Make sure you are implementing a backup process of mobile devices.
5) Perform a restore to the replacement device.
Of course, we make this process sound easy, but how do you go about it and how do you get started? Well at GKM2, we provide fully managed services so you can get on with your business.
For complete mobile device management and security audit, get in touch with me; email@example.com and find out how we can secure your data and your mobile fleet of devices.
As an added bonus we’re giving away our free IT security blueprint for your business check it out below.