Story image

Working through the holiday season? Four ways to keep your mobile device secure

13 Dec 2017

As holiday season kicks in and offices lock their doors, some organisations and their employees will continue working remotely. To do this in a secure way, Ixia says that employees must not overlook mobile device security.

According to Ixia general manager Ardy Sharifnia, mobile security is especially important at this time of year because of the popularity of those devices.

“Cybercriminals know that employees can get caught up in the rush of the holiday season, making them potentially easy targets. Employees need to ensure their devices are well protected to avoid frustration and compromised data,” Sharifnia explains.

Ixia has prepared four tips that businesses can use to secure mobile devices through the holiday period.

1.  Check mobile networks 
All devices connected to the Internet to share data are part of a network. Employees working remotely over the holidays need to ensure that the Wi-Fi network they are connecting to is legitimate and secure. The best way to do this is to check if the network requires a password. A password ensures encryption to prevent unauthorised access to sensitive data and other personal information. 

2.  Beware of mobile applications 
Employees often download applications for work that can open the door for malicious software. Laptops are more at risk due to their ability to install any software without being limited to a specific app store. Updating anti-malware and anti-virus software before the holidays can help detect threats that would otherwise go unnoticed, and help secure devices from harmful downloads and apps. 

3.  Develop a strong password 
Anyone can pick up an unprotected device and obtain sensitive information within seconds, which is why all devices should be protected with a strong password. A good password includes a random combination of letters, numbers, and special characters to make it harder for someone to guess. Remote employees should also look at personalising security settings, to automatically lock the screen of any device after remaining inactive for a minute. 

4.  Ensure a solid IT foundation 
Before the office closes for the year, IT staff should ensure all software, features, and security fixes are up to date. Checking for device updates will help secure devices and identify any holes cyber attackers can use to gain access. 

“Employees planning on working from mobile devices over the holidays should consider all the potential risks and take the proper measures to ensure their devices, data, and sensitive information is all protected. Cybercriminals don’t take holidays, so neither should security,” Sharifnia concludes.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.