To give you the best experience, this site uses cookies. By continuing to use our site, you agree to our use of cookies. To learn more, please read our privacy policy.
Network Security Best  Practices for Mobile Business
June 24th, 2016

Network Security Best Practices for Mobile Business

Bill Gaskill

Smartphones are becoming a new norm in the workplace. With the bring-your- own-device (BYOD) policy becoming commonplace at many companies, inevitably there are going to be new security issues. BYOD b...

Smartphones are becoming a new norm in the workplace. With the bring-your- own-device (BYOD) policy becoming commonplace at many companies, inevitably there are going to be new security issues. BYOD brings with it the possibility of sensitive information being available on several personal devices. You need to plan and implement appropriate network security practices for your mobile business.

Anti-malware

Malware is a term that describes intrusive software like a virus that can enter the network and damage the contents. Mobile operating systems are quickly becoming targets for this type of attack. Smartphones and tablets that employees use to connect to the office network should have anti-malware installed.

Make sure your company policy addresses this issue before you initiate a BYOD policy.

Audits

Security testing firms exist and can perform penetration testing on mobile devices used in the workplace. These tests will determine how easy it would be for a hacker to enter your network, and if there are issues regarding the security of the network through mobile devices.

These testing companies can offer solutions for any weaknesses they detect. Hiring a firm to audit mobile security at least is something you should consider as part of your overall IT strategy.

VPNs (Virtual Private Networks)

Wireless communications are usually more vulnerable to interception than systems connected through Ethernet. Hence, you need to consider another way to protect your wireless mobile devices.

You can install VPNs on mobile devices used for company purposes. Mobile devices used to access remote desktops or other services will be protected by a strong encryption provided by the VPN, as well as logged, managed, and authenticated by your IT section.

Bluetooth

Bluetooth can create an unsecured wireless network. Ensure that when Bluetooth is not in use, it is disabled. Take appropriate steps to minimize the risk of Bluetooth use in the office. Require that all employees configure mobile devices so that Bluetooth is not active or discoverable when not in use.

Passwords

Letting a device fall into the wrong hands is the best way to ensure a network security breach for mobile business. Password protection, in the absence biometric security, is a necessity.

Ensure that all employees not only use strong passwords but also change them at a minimum monthly. Also, consider programming auto-erase after a certain number of failed login attempts.

Gateways

Creating special gateways specifically for use by mobile users can minimize what information is accessible on a mobile network and help eliminate the potential for data loss.

These gateways can have their own firewalls and security controls that are separate from the office network. This provides protection for both networks while at the same time creating a gap between them to minimize the data loss on your servers in the event of a virus.

Block third-party software

Prevent the unintentional installation of dangerous software by prohibiting third-party software installation on mobile devices. By implementing a remote virtual work environment, the chances of third-party software problems are minimized.

Final comments

Keeping your mobile office safe takes some forethought and planning. Raising employee awareness, combined with instituting appropriate mobile business security practices, will ensure that your enterprise can utilize all the benefits of a mobile office without increasing your risk of cyber hacking.


Related Articles

Ordinary Phone or Smart Hub?