Conduct Real Business From Your Mobile Device



Conduct Real Business From Your Mobile Device

In today’s world, it’s rare to find a person who doesn’t use a smartphone, tablet or another mobile device of some sort. Brands and service providers vary, but almost everyone today carries a mobile device.

Use of mobile devices rises

A report by Google found that smartphone usage rose 44 percent during the first three months of last year. Smartphone users are relying more on their devices, with 66 percent of people accessing the Internet daily from a cell phone. Since smartphones have become so integral, businesses that have a mobile strategy benefit from constant connectivity with their customers.

To implement an mPOS, a business needs an internet connection, a credit and debit card reader, and an application downloaded to whatever device it wants to use for the transactions. A user can then download a POS app and connect the reader to their mobile device. They have changed the way business owners conduct business on a daily basis. Mobile devices improve the customer experience. These days, consumers are well aware that there are various means of communication with the companies they do business with. Sure, they may pick up the phone and call or even send emails.

According to CNET, there are 2.1 billion Internet users in the world today, which accounts for 30 percent of the world’s population. With mobility, people can now access the Internet wherever they are, and employees can work remotely wherever there is Internet access.

The Google report noted that 80 percent of people don’t leave home without their smartphone. When looking up information on a local business, 94 percent use their smartphone and 90 percent of those people follow it up by contacting the business or making a purchase. People who used their smartphone to make a purchase made up 35 percent or people surveyed.

Seventy percent of people have bring-your-own-device (BYOD) policies at their office, said VentureBeat. Workers are increasingly using smartphones, tablets and laptops to conduct their business. With so many employees working outside of the office, mobile virtualization has become a legitimate and necessary option.

A study by Gartner found that 33 percent of office software will be cloud based by 2017. There’s approximately 50 million cloud-based enterprise systems currently. Employees are more frequently conducting work in the cloud, using mobile business applications to create spreadsheets, presentations and documents. Gartner expects cloud computing-based office systems to steadily grow through 2015 and increase speed as service is moved into the cloud and as the average number of devices employees use increases.

With the increasing power of mobile devices and the number of employees working remotely on the rise, your company must also recognize the importance of protecting sensitive company information on these devices. Your small business wants to enjoy the benefits of remote working, including happier and more efficient workers and lower infrastructure costs, but you also need to take the necessary actions to avoid the potential security hazards of using mobile devices.

In this blog post, we will summarize how your company can continue to enjoy the benefits of remote work while effectively protecting your sensitive information on mobile devices.

Physically Secure Your Mobile Devices

A recent study by the Ponemon Institute reported the sobering statistic that 46% of organizations experienced a data breach because of a lost or stolen mobile device. With the increased usage of mobile devices for work, there must also be a stronger emphasis of the importance of physically securing each device. This means that employees must maintain their devices on their person and always store them in physically secure locations safe from both criminals as well as curious children.

Conduct Real Business From Your Mobile Device

Each mobile device should be locked with a password or a secure PIN that is time sensitive. This feature should automatically protect a device after a short period of inactivity. Most cell phone providers also offer a feature to remotely lock down or even erase information on a device if it is lost or stolen. Many also offer a feature that orders a phone to erase any stored data after a certain number of failed login attempts.

In addition, all employees should note each device’s identifying information such as serial numbers and the date and place of purchase. This information will be useful for tracking down or identifying any device that has been lost or stolen.

Ensure Adequate Protection Against Cyberattack

MobileConduct

Although mobile devices are just as vulnerable to cyberattack as traditional networked computers, far too many of them do not have adequate antivirus protection. One recent study found that less than 20% of mobile devices have adequate antivirus software installed, which makes them an inviting target for skilled hackers. Your company should make certain that all devices are properly protected with the most updated antivirus programs.

It is also recommended that users not install third-party applications on their mobile devices, as this can allow malware to be introduced to the device and the company’s network. Only authorized apps should ever be downloaded onto mobile devices.
In addition, most experts recommend that users carefully control their devices’ abilities to accept open Wi-Fi and Bluetooth signals. Cybercriminals in public places often take advantage of these features to eavesdrop on mobile devices and access sensitive data. Some experts recommend completely disabling these features as well as GPS capability to prevent hackers from obtaining useful information for a potential cyberattack.

Devices

Prepare and Implement a Strong Mobile Device Use Policy

A mobile device use policy is a set of guidelines that explain how employees are allowed to use mobile devices concerning company data. Within these guidelines, the company should describe the type of mobile devices that are permitted, the required security protocols to use to prevent data breaches and the loss of the devices, necessary password policies and encryption methods, and any additional information specific to the company’s type of business or clients.
Every employee should be trained and tested in the use of this policy before being authorized to conduct company business on mobile devices.

Conduct Real Business From Your Mobile Devices

Prepare and Implement a Comprehensive BYOD Policy

An option contained within a company’s mobile device use policy is the possibility of employees using their own personal mobile devices for company business; this arrangement is known as “Bring Your Own Device” or BYOD. Some companies and organizations have determined that their data is too sensitive or complex to allow an employee to use their own devices to perform company work, so they do not permit BYOD.

If your company does decide to allow BYOD, we recommend you take the time, in cooperation with your trusted IT Support partner like Network Depot, to prepare a reasonable BYOD policy that allows your business to take advantage of remote work but also ensures the proper level of protection. All employees should be well trained on how to properly and safely use their own devices for company work and should know the proper procedures to follow if their device is breached, lost, or stolen.

One important aspect of the BYOD policy is to have steps in place to ensure that all company data is wiped or returned to the business when the employee no longer works for the company. The company should also retain the ability to remotely wipe or lock sensitive data on an employee’s mobile device in order to protect against any malicious actions as a result of termination or other events.

Take Advantage of Security Features and Data Encryption

Conduct Real Business From Your Mobile Device Working

Most mobile devices have advanced security features and encryption capabilities in place that should be properly utilized in personal and professional use. Some of these features we have already mentioned such as auto-wipe, device lockout, passwords, and PINs. Experts also recommend the use of unlock patterns with at least five points for additional security. They caution that users should keep their mobile device screens free of smudges in order to prevent criminals from determining passwords, PINs, and unlock patterns.

Have Robust Backups in Place

As discussed in our previous blogs on cybersecurity, the final protective measure for company data is provided by the use of data backups. With an automated program that comprehensively backs up your sensitive data on a regular basis, your company can rest easy whether using traditional workstations or mobile devices. In the event that there is a data breach or the mobile device is lost or stolen, the data contained on it can immediately be recovered and operations can be quickly restored. It is particularly important to have this backup ability when your company employs the auto-wipe option, as sensitive data can be quickly erased or locked out for a variety of reasons.

In summary, we recommend that your small business follow these suggestions and consult with a trusted IT Support partner like Network Depot to prepare a comprehensive mobile use policy, which incorporates all the requirements of your unique business. If you take the time to prepare your company and employees to safely and effectively use mobile devices, your business should be able to reap the many benefits of remote work with the confidence that your sensitive data is secure.