Tap To Call
Facebook NSCTwitter NSCGoogle Plus NSCLinkedin NSCBlog NSC
Call: 713.974.3889

Your Overlooked Security Hole: Mobile Devices

Mobile device security is largely misunderstood. “Only desktops and laptops are vulnerable to hacks and break-ins, right? And there’s no such thing as viruses for my phone or tablet, right?”

Actually, a new mobile device attack is launched every minute. A great number of security hacks now exist that specifically target soft spots in mobile device security. Today we will talk about potential vulnerabilities. Next time we’ll discuss active countermeasures you can take to further secure your mobile devices.

Though many believe that their mobile devices are largely unaffected by viruses and security threats, the first mobile device virus actually was released back in 2004. The proliferation of the “Internet of Things” has only rendered our devices even more vulnerable, as many new devices, especially those designed for smart homes, have sacrificed good security practices in the name of ease of use.

The fact is, our mobile devices now incorporate much of the functionality, and in many cases the exact same applications, as our desktops and laptops. Because mobile devices are now ubiquitous in the workforce, bad actors are pouring time and energy into defeating mobile device security.

The careful enterprise, therefore, will need to treat its mobile devices as if they are all potential security holes in the enterprise. Devices need to be kept up-to-date with the latest revisions to operating system software, and security updates need to be rolled out immediately. Your business might also need mobile threat protection applications to reduce the chances of cyber attacks. Additionally, your firm might require the ability to track missing devices or to remotely deactivate devices in the event one is stolen or misplaced. Keep in mind that the sooner you treat mobile devices as intellectual property belonging to your business, the safer you will be.

Your employees also need to embrace best practices. Require two-factor authentication for remote sign-ins. Ensure that employees utilize secure passwords, or even biometrics when available. And regular password updates, at least every 90 days, should also be part of your security, even though users tend to dislike utilizing rotating passwords. Security must be the primary focus to protect yourself and your business.

NSC Information Technology Group knows the ins and outs of mobile device security. If you have questions about your company’s host of mobile devices and how to secure them, contact NSC Information Technology Group today and begin fighting back to protect your company’s assets.

This entry was posted in Cyber Security, Network Security. Bookmark the permalink.