800 797 5478

free quote

6 Tips for Mobile Device Security

mobile-phone-security

As today’s business landscape becomes ever more mobile-friendly, smartphones and tablets are fast becoming standard operating equipment for most companies. And because these devices are constantly being updated by their manufacturers, companies regularly swap out older models for newer, more relevant devices.

The problem with this scenario is that most companies fail to realize that mobile device security is as equally as important as computer data security. After all, these devices are essentially small computers and they store data in much the same way as the company’s computers so they need to be treated with the same respect. If your company supplies its employees with mobile devices for business use, here are six tips you can use to help strengthen your mobile data security.

#1: Only Use Encrypted Mobile OS Systems

Not every mobile device uses hardware-based encryption, so your first step in protecting your data is to ensure that the devices your company uses does. Apple’s iOS and RIM’s Blackberry use encryption on both internal and external storage, that’s why they are among the most common device manufacturers for businesses. If you use a mobile device that doesn’t feature internal and external encryption, then you face an increased risk that someone could access data on the device even without your lock pin or password.

#2: Enable Auto-Wiping of Data

If you enable your device’s auto-wiping of data feature, the device will automatically wipe its data after a certain number of times an incorrect password is used. Apple iOS, RIM Blackberry, and Windows Phone 7 each have auto-wiping natively built-in, but Android phones require the use of a third part app like Autowipe. If enabling data auto-wiping, it is important to regularly back up the device’s data so in the event that the device gets stolen and its data gets wiped, the data can be restored to a new device.

#3: Setup Remote Tracking and Management

Remote tracking and management will help you locate your lost or stolen device, but it only works if you set it up prior to the device being lost or stolen. Most programs even allow you to wipe the phone’s data remotely for added protection. Apple iOS (version 4.2 or later), RIM Blackberry, and Windows Phone 7 each provide free remote tracking and management services. Older Apple iOS devices (pre-4.2) require the use of Apple’s MobileMe service (priced at $99 a year after the 60 day free trial) while Android phones require the use of free or paid third party remote tracking apps.

#4: Limit Wi-Fi Hotspot Access Use

These days Wi-Fi hotspots are all over the place, but not all of them are encrypted and using them could place your mobile device data at risk. The reason is because anything you transmit over the wireless network is open for interception by those with the technology to grab it. If you need to transmit data over a Wi-Fi hotspot connection, only use an encrypted Wi-Fi hotspot that uses enterprise encryption and 802.1X authentication or send your data over your standard 3G or 4G cell phone connection as they are usually encrypted by most carriers and less likely to be perused by information thieves.

#5: Use an Antivirus or Mobile Security App

It’s not common for a mobile device to become a victim of a malware, virus, or hack attack, but it’s not impossible and risks are always getting higher. Therefore, to help ensure your mobile device security, you should install an antivirus program or a mobile security app. Many of the more robust antivirus programs also feature remote data wiping, data backup, and device tracking.

#6: Sanitize All Retired Devices

Every time your company undergoes a technology refresh of its mobile device network, all the retired devices should be sanitized in accordance with the standards set in NIST 800-88. This helps to protect your business against data breaches should the equipment be sold or re-used. If the devices are not going to re-enter the market, then partnering with an IT asset disposition (ITAD) vendor that can wipe the data, shred the devices, and safely recycle and dispose of the e-waste will provide your company with the security protection it needs.

If you have an inventory of retired mobile devices that you need to be wiped or physically destroyed, then Liquid Technology can help. We use software that is specially designed to wipe data on solid state drives (SSDs) and the mobile devices like smartphones and tablets that use Flash SSDs. Our proprietary data wiping software erases data in accordance with NIST 800-88 standards so you can have peace of mind knowing that your privacy is protected. Call us today at 800-797-5478 to speak with one of our mobile data security experts to learn more or to schedule service.

GET A FREE QUOTE