Friday, 16 December 2016 12:34

Why SMBs Must Proactively Address the Threat of Mobile Hacks

Written by
Rate this item
(0 votes)

More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.

This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.

If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation.

Don’t Just Say You’re Worried About the Bad Guys… Deal With Them

SMBs say they view network security as a major priority but their inaction when it comes to mobile devices paints a different picture. A recent study found that only 16% of SMBs have a mobility policy in place.

Despite the fact that stolen devices are a major problem in today’s mobile workforce, only 37% of mobility policies enforced today have a clear protocol outlined for lost devices.

Even more troubling is the fact that those firms who have implemented mobility policies have initiated plans with some very obvious flaws.

Key components of a mobility policy such as personal device use, public Wi-Fi accessibility, and data transmission and storage are often omitted from many policies.

Thankfully, most SMB cybercrimes can be avoided with a comprehensive mobility policy and the help of mobile endpoint mobile device management services.

A Mobility Policy Is All About Acceptable/Unacceptable Behaviors

Your initial mobility policy doesn’t have to be all encompassing. There should be room for modifications, as things will evolve over time. Start small by laying some basic usage ground rules, defining acceptable devices and protocols for setting passwords for devices and downloading third-party apps. Define what data belongs to the company and how it’s to be edited, saved, and shared. Be sure to enforce these policies and detail the repercussions for abuse.

Features of Mobile Device Management Services

MDM services are available at an affordable cost. These services help IT managers identify and monitor the mobile devices accessing their network. This centralized management makes it easier to get each device configured for business access to securely share and update documents and content. MDM services proactively secure mobile devices by:

  • Specifying password policy and enforcing encryption settings
  • Detecting and restricting tampered devices
  • Remotely locating, locking, and wiping out lost or stolen devices
  • Removing corporate data from any system while leaving personal data intact
  • Enabling real time diagnosis/resolution of device, user, or app issues

It’s important to realize that no one is immune to cybercrime. The ability to identify and combat imminent threats is critical and SMBs must be proactive in implementing solid practices that accomplish just that.

Read 2165 times Last modified on Tuesday, 20 December 2016 15:57
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA

More in this category: Mobile Device Management »

105 comments

  • Comment Link Teresa Wednesday, 18 September 2019 04:51 posted by Teresa

    Ridiculous story there. What happened after? Thanks!

  • Comment Link Harley Monday, 16 September 2019 12:21 posted by Harley

    Heya i am for the first time here. I found this board and I find It truly useful & it helped me out a
    lot. I hope to give something back and aid others like
    you helped me.

  • Comment Link Brandy Monday, 16 September 2019 11:04 posted by Brandy

    What's up it's me, I am also visiting this website regularly, this web page is actually fastidious and the users are genuinely sharing nice
    thoughts.

  • Comment Link Octavia Monday, 16 September 2019 06:12 posted by Octavia

    Hi, i read your blog from time to time and i own a similar
    one and i was just wondering if you get a lot of spam feedback?

    If so how do you stop it, any plugin or anything you can recommend?
    I get so much lately it's driving me insane so any help is very much appreciated.

  • Comment Link Charissa Sunday, 08 September 2019 13:01 posted by Charissa

    Hello there! This post couldn't be written any better!
    Going through this post reminds me of my previous roommate!
    He constantly kept talking about this. I will send this information to him.
    Fairly certain he's going to have a good read. Thanks for sharing!

  • Comment Link Marcus Saturday, 07 September 2019 23:24 posted by Marcus

    Undeniably believe that which you said. Your favorite justification appeared
    to be on the web the easiest thing to be aware of.
    I say to you, I definitely get irked while people consider worries
    that they just do not know about. You managed to hit the nail upon the top and also defined out the whole
    thing without having side effect , people could take a
    signal. Will probably be back to get more. Thanks

  • Comment Link Monserrate Saturday, 07 September 2019 23:14 posted by Monserrate

    If you are going for best contents like myself, simply visit this
    website all the time as it presents feature contents, thanks

  • Comment Link Jude Saturday, 07 September 2019 08:17 posted by Jude

    When someone writes an paragraph he/she maintains the plan of a user in his/her mind that how a user can know it.
    Thus that's why this paragraph is amazing. Thanks!

  • Comment Link Bennett Saturday, 07 September 2019 08:14 posted by Bennett

    I’m not that much of a internet reader to be honest but your sites really
    nice, keep it up! I'll go ahead and bookmark your site to come back later
    on. All the best

  • Comment Link Perry Saturday, 07 September 2019 06:34 posted by Perry

    Link exchange is nothing else but it is simply placing the other person's
    website link on your page at proper place and other person will also do similar for you.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.