Monthly Archives: January 2014

Mobile Security: Why Should I Care?

Mobile security is top of mind when it comes to concerns for IT Managers.  According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops.   It is no surprise that mobile devices are the target of mobile security threats.

Chances are most people in your company have a smartphone, tablet or both.  In some cases these devices connect to your company network using WiFi.  It is equally likely that these devices access company information via email, mobile applications or file synch to company data.  Now that these devices are universal, it is important to have a plan if they are lost or stolen. Keep in mind, your four digit password may be the only thing between an intruder and your data.  Here are some additional considerations for mobile security.

Mobile Security Policy

While you can remotely wipe a Mobile devices when it is lost or stolen, this may not be enough.  That four digit passcode can be easily hacked in minutes.  It is important that employees know how to report a lost or stolen device immediately.  Also consider, there may be personal information on the device that is property of your employee.  This data may not be backed up and could be impossible to recover. There may be local laws that prevent you from wiping this type of data from personal devices.  If your employees access your corporate systems, be sure they sign and acknowledge your company policy for acceptable use, including policy for reporting lost or stolen devices and mobile device policy for storage of personal data on a company owned mobile device.

Mobile Security Training

Some social networks are designed to harvest contact information that may be synched with corporate contacts.  Publishing privacy data without consent may be considered a data breach.  Train your employees on the importance of mobile security policy and the related mobile security risks.

In addition to mobile anti-virus, mobile anti-malware detection, device management, mobile phishing protection, your knowledgeable employees are one of your first lines of defense against the threat of a mobile security breach.  If you feel your employees need training or your mobile security policy is not up to date, contact your mobile security professional today!

Target Privacy Data Breach: Part 2

Target Retailers were just involved in the second largest credit card data breach in United States history. Today Target announced the data breach that occurred over Thanksgiving weekend now exposes upwards of 70 million credit and debit cards. Target also disclosed the privacy data breach compromised names, addresses, phone numbers or email addresses, in addition to credit card information.  When businesses are victims of a security breach, loss of revenue is often highlighted in the news. What the media often overlooks is the internal costs of remediation, exposure to privacy breach laws and loss of reputation with their customers.

Any Business can be the Target of a Privacy Data Breach

While large companies make the news, many small business owners believe their company is too small to be targeted by cyber criminals resulting in privacy data breach.  According to Verizon Wireless’s 2012 Data Breach Investigation Study, 71% of data breaches occur in companies with fewer than 100 employees.  A privacy data breach can be devastating to a small business. Malware or software used to interrupt a computer’s processing, is a common way of perpetrating these attacks.  Small businesses are often unprepared when it comes to these attacks.

What a Business Owner do to Avoid a Privacy Breach

Action can be taken to protect your small business and your customer’s sensitive information.  First, audit your network regularly. Periodically scan your network for unauthorized computers and devices connected to your network directly or via Wi-Fi.  Also, update any antivirus or malware software regularly. Check your firewall and security settings.  Make sure all your defense mechanisms are up to date and working properly.

It is important to keep a secure network to ensure your customers trust.  By keeping all software up to date and checking systems regularly, you can take steps to protect your privacy data from breach.  Avoid loss of revenue, internal costs of remediation and a tarnished reputation by taking precautions to protect your customers’ privacy data.