How to Secure Your Handheld Device Below are a few guidelines on how to secure handheld devices in your small business: Establish a security policy that outlines how handheld devices should be used. Include where the devices can and cannot be used, what information can be stored on the devices, who is allowed access to what, how to create strong passwords, and specific programs and applications that may be downloaded and used. Use file encryption and authentication. If data is lost or stolen, that information will be unreadable without authentication and use of a decryption key. Most devices are equipped with these security features, but third parties also offer data encryption that’s more difficult to crack. Only beam, or transmit data, from and to protected sources. If one source has a virus, you risk ‘cross-pollination.’ In order words, if data from a PDA has a virus, it could be introduced to the network when the device is synched to the desktop. Synchronize your device with a desktop or laptop on a regular basis to prevent data loss. Think of the desktop or laptop as a first level backup system. Then, if your handheld does get a virus or data is corrupted, you only lose a small amount of data–or none at all. Run antivirus software on the desktop, laptop, and handheld. Configure the antivirus program to run continuously and to alert you when malicious code is detected. When remotely connecting to a business network, make sure to go through a VPN client. In doing this, you are protecting the wireless transmissions from intruders as well as the data in transit. Consider using third party applications. Software vendors offer PDA-specific firewalls, data encryption products, antivirus software, and other security tools. If you store highly sensitive information on your PDA, consider installing bit-wiping packages. Bit-wiping overwrites the entire device memory, essentially, reformatting the PDA so data cannot ever be recovered. You can configure bit-wiping to occur when there are too many failed password attempts or when the PDA hasn’t been synchronized in a set timeframe. Download only from trustworthy sites. You should always be wary of free downloads, whether for desktops, laptops, or PDAs, from unfamiliar sites. Read EULAs thoroughly and note whether or not adware or spyware is bundled with the application or program you are downloading. Don’t take unnecessary chances when downloading from the Internet. The most basic method of accessing data on a handheld device is directly through the device’s user interface. The first thing you should do when you start using the smartphone or PDA is change the default password. Use strong passwords as a first line of defense, which should include upper and lowercase letters, numbers, and symbols. Configure the password setting for power-on, meaning you need password authentication when turning on the device and when the device has been idle for a set period of time. You can also configure password settings to lock the device after multiple failed attempts. from Symantec |
Making things happen is the art and science of project management. The process involves managing…
In today's fast digital life, website performance is important, as it holds visitors and ensures…
The FBI reported that cyber attacks against government facilities saw an increase of almost 36…
In today’s fast-paced, technologically advanced world, businesses of all sizes increasingly rely on digital systems…
You likely hear terms like "blockchain," "machine learning," and "cloud computing" without considering their real…
In today’s fast-paced digital landscape, businesses cannot thrive without effective collaboration. Microsoft continues its unwavering…