Smartphone: 10 Tips to Secure Mobile Devices

Smartphone: 10 Tips to Secure Mobile Devices


The number of threats to smartphones continues to grow. Especially on the Android system, the most attacked by cyber hackers.
A risk, for all users and especially for companies via nomadic staff or personal telephones by taking the risk of infecting workstations or the theft of sensitive data.

In this perspective, Sophos offers 10 tips to limit the risk of attacks ...

 

  1. Inform Users of The Risks
    Users should understand that the applications or games they download are potentially malicious
    As a general rule: do not install an application that requires more resources or information than is necessary to complete its goal.

     
  2. Protect Wireless Networks Used to Access Corporate Data
    Wireless networks are generally not very reliable from a security standpoint.
    It is strongly recommended that companies develop acceptable use policies, provide VPN technology, and require their users to connect through these secure tunnels.

     
  3. Develop and Enforce Usage Policies for Personal Devices (BYOD)
    Ask yourself this question: How do you control a device that is owned and controlled by the user but that accesses the corporate network?
    Employees who use their own devices at work are required to ensure that through them, their company remains in compliance with applicable regulations.

     
  4. Prohibit Jailbreaking
    The "jailbreaking" consists of removing the security measures imposed by the publisher of an operating system.
    And without any security, apps whether malicious or not are free to access data stored on the device.
    In short, it is best not to accept jailbroken devices in the company.

     
  5. Keep Operating Systems Up to Date
    In the Android ecosystem, updates can be blocked in several different ways:
    - by Google (which updates the operating system);
    - by the handset manufacturer (who may decide to distribute updates only to recent models);
    - or by the operator (who may not provide enough bandwidth to allow updates).
    Without the ability to update your Android operating system, your device is vulnerable to malware.
    Look for operators and manufacturers that allow the application of updates. 

     
  6. Encrypt Your Devices
    The risk of losing a portable device is higher than the risk of getting infected.
    Encrypting devices significantly complicates data hijacking.
    Developing a strong password for the device and SIM card is essential.
     
  7. Develop Mobile Security Policies That Are Compatible With Your Overall Security Strategy.
    If a device does not comply with security policies, it should not be allowed to access corporate data.
    Users should have a clear list of authorized devices.

     
  8. Only Install Apps From Trusted Sources and Consider Setting Up an Enterprise App Store.
    Only allow installation of apps from sources such as Google Play and the Apple App Store.
    Consider setting up a corporate app store for the distribution of in-house developed apps and corporate authorized apps.

     
  9. Offer Alternatives to Transferring Information via the Cloud
    Mobile users need a place of storage that they can access from any device.
    It is common for these to use cloud services without obtaining prior permission from their company.
    In order to help these employees safely, it is advisable to consider building a secure cloud-based storage service.

     
  10. Encourage Users to Install Antivirus Software On Their Devices.
    Although malware is found for the iOS and BlackBerry operating systems, their interfaces do not support antivirus
    Despite this fact, the risk of infection is always higher for Android, for which there is however dedicated security software.
    Make sure to protect all your Android devices with Antivirus software.








Comments

Popular posts from this blog

What is Total Security Software and Why is It Essential in Today's Digital World?

What Are the Benefits of Using Antivirus Software With Browser Extensions?

The Importance of Multi-Factor Authentication in Cybersecurity | Total security