How to Secure Your Handheld Device Below are a few guidelines on how to secure handheld devices in your small business: Establish a security policy that outlines how handheld devices should be used. Include where the devices can and cannot be used, what information can be stored on the devices, who is allowed access to what, how to create strong passwords, and specific programs and applications that may be downloaded and used. Use file encryption and authentication. If data is lost or stolen, that information will be unreadable without authentication and use of a decryption key. Most devices are equipped with these security features, but third parties also offer data encryption that’s more difficult to crack. Only beam, or transmit data, from and to protected sources. If one source has a virus, you risk ‘cross-pollination.’ In order words, if data from a PDA has a virus, it could be introduced to the network when the device is synched to the desktop. Synchronize your device with a desktop or laptop on a regular basis to prevent data loss. Think of the desktop or laptop as a first level backup system. Then, if your handheld does get a virus or data is corrupted, you only lose a small amount of data–or none at all. Run antivirus software on the desktop, laptop, and handheld. Configure the antivirus program to run continuously and to alert you when malicious code is detected. When remotely connecting to a business network, make sure to go through a VPN client. In doing this, you are protecting the wireless transmissions from intruders as well as the data in transit. Consider using third party applications. Software vendors offer PDA-specific firewalls, data encryption products, antivirus software, and other security tools. If you store highly sensitive information on your PDA, consider installing bit-wiping packages. Bit-wiping overwrites the entire device memory, essentially, reformatting the PDA so data cannot ever be recovered. You can configure bit-wiping to occur when there are too many failed password attempts or when the PDA hasn’t been synchronized in a set timeframe. Download only from trustworthy sites. You should always be wary of free downloads, whether for desktops, laptops, or PDAs, from unfamiliar sites. Read EULAs thoroughly and note whether or not adware or spyware is bundled with the application or program you are downloading. Don’t take unnecessary chances when downloading from the Internet. The most basic method of accessing data on a handheld device is directly through the device’s user interface. The first thing you should do when you start using the smartphone or PDA is change the default password. Use strong passwords as a first line of defense, which should include upper and lowercase letters, numbers, and symbols. Configure the password setting for power-on, meaning you need password authentication when turning on the device and when the device has been idle for a set period of time. You can also configure password settings to lock the device after multiple failed attempts. from Symantec |
UPCOMING VIRTUAL EVENTS
Demystifying Cyber Security for SMBs
The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.
SESSION 4: Cyber Security Strategy
Watch On-Demand
SESSION 5: Cyber Insurance & MFA
Watch On-Demand
SESSION 6: Threat Detection | JAN. 15
Microsoft Copilot
Master Class Workshop
eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.
In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.
RESOURCES
Cyber Security Awareness Hub
Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.
We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.
Resource Library
Insights to help you do what you do better, faster and more profitably.
> Tips to Stay Protected Against Phishing Attacks
> Understanding Ransomware
> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them
> Practical Advice for Avoiding Phishing Emails
Recent Articles
NEWSLETTER
"*" indicates required fields