used with permission from Tektonika (HP)
by Joe Hewitson
The snow gently falls outside as you kick back in your Snuggie, ready to conquer that Netflix backlog. You’ve earned it! During the months leading up to winter, you vanquished any and all network security vulnerabilities threatening your digital kingdom, and now, your office is more secure than the Fortress of Solitude.
But then, you look at your watch and realize the minutes are melting away, even though the outside world is freezing over. Days are getting shorter, and the seasons are changing. While you’ve admirably confronted office security head-on, cold weather heralds more travel, as employees seek to escape the freezing temperatures for warmer paradises. More travel means more devices outside your newly secured office.
Looks like your watch list will have to wait. You need to tackle travel security before winter has your users bringing back more than just off-season sunburns from their vacations.
Control the chaos in 3 steps
As the beaches of Cancun play host to thousands of weary travelers this season, smartphones, tablets, and laptops are sure to tag along. While these devices lay dormant in purses, suitcases, and hotel safes, there’s precious little you can control.
Time to kick those procrastination tendencies and take charge of your mobile fleet before it wanders outside your area of influence. In a lot of ways, it’s like preparing your kids for college: You only have so much time to make sure they’re ready for the dangers of life in this crazy world.
Fortunately, mobile devices are much more willing to heed your council. Here’s a quick checklist you’ll want to run through before your users flee the icy grasp of a lingering winter:
1. Lock up your data
Firstly, you want to make it easier for users to leverage data remotely by empowering them with cloud tools, so they can be productive without the inherent risk of local data. When it comes to email and other communication, make sure you set up a digital policy that prevents messages from being stored on mobile devices and enforces appropriate security measures for access.
2. Stop the identity shuffle
Identity theft is an obvious concern for both network security and travel security. Your users probably use their smartphones for checking their bank accounts as much as their inboxes, so shoring up app security should be a priority. The good news is most apps containing identity information—like banking, social media, and mobile wallets—already store most data in the cloud. That said, if the phone is lost, stolen, or otherwise compromised, access to these apps is all the bad guys need to assume your identity.
Before your users—and their smartphones—head to the airport, guide them through the process of culling and securing potentially vulnerable apps. Show them how to enable dual authentication for their favorite payment apps. Reveal the glorious freedom that comes from deleting unused apps. And don’t forget about apps acting as gateways to more important apps or services. Password managers and authenticators likely aren’t necessary for the warm shores of Mexico and can be safely disabled until the return voyage.
3. Teach productive paranoia
The final key to preparing mobile devices for life outside your IT environment involves instilling a healthy level of suspicion. When your users travel, whether for work or pleasure, security is almost always sacrificed for convenience.
Ultimately, there’s only so much you can control when it comes to your user’s mobile devices, especially when those devices travel abroad. But the time to assert what you can control is now. Until smartphones can continuously monitor their own security, like some printers do, equipping your users with the knowledge and tools to do so ahead of time is your best bet.
To learn more, contact us today.
Cyber threats never take a day off, never clock out and go home at the…
Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…
Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…
Making things happen is the art and science of project management. The process involves managing…
In today's fast digital life, website performance is important, as it holds visitors and ensures…
The FBI reported that cyber attacks against government facilities saw an increase of almost 36…