<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2119418688374700&amp;ev=PageView&amp;noscript=1">

5 Ways Companies Can Improve Mobile Device Security

April 20th, 2022

3 min. read

By Zachary Kaiser, Strategic Risk Advisor

Keep your Company Devices Safe from Threats with These Proactive Steps

Gone are the days when the most sensitive information on an employee’s phone was contact names and phone numbers. Now a smartphone or tablet can be used to gain access to anything from emails to stored passwords to proprietary company data and trade secrets. With the advent of 5G technology making accessibility easier and faster, more and more companies are poised to adopt mobile technology as a normal part of business.

Depending on how your organization uses such devices, unauthorized access to a smartphone, tablet or other IoT device can lead to a catastrophic cyber-incident involving an organizations entire IT infrastructure. While it’s important to implement cybersecurity safeguards as a whole, the following measures will help you avoid security issues with mobile devices in particular and keep your data safe.

1. Establish a Mobile Device Security Policy

Before issuing smartphones or tablets to your employees, establish a device usage policy. Provide clear rules about what constitutes acceptable use. Include what actions will follow if employees violate the policy. It is important that employees understand the security risks of smartphone use and the security measures they can take to mitigate those risks. Well-informed, responsible users are your first line of defense against cyber attacks.

2. Establish a Bring Your Own Device Policy

If you allow employees to use their personal devices for company business, make sure you have a formal Bring Your Own Device (BYOD) policy in place. Your BYOD security plan should also include:

  • Requirements for installing remote wiping software on any personal devices used to store or access company data
  • Education and training for employees on how to safeguard company data when they access wireless networks from their own mobile phones and devices
  • Data protection practices that include requiring strong passwords and automatic locking after periods of inactivity
  • Protocols for reporting lost or stolen devices
  • The use of certain antivirus and protective security software
  • Requirements for regular backups
  • An approved list for those who want to download apps

3. Keep the Devices Updated with the most Current Software and Antivirus Programs

Software updates to mobile devices often include patches for various security holes that can be an open door for mobile malware and other security threats. Therefore, it is a security best practice to install the updates as soon as they become available.

When it comes to antivirus software for mobile devices, there are many options to choose from and it can come down to preference. Some are free to use from the app store while others charge a monthly or annual fee and often come with better support.

In addition to antivirus support, many of these programs will monitor Short Message Service (SMS) texts, Multimedia Messaging Service (MMS) and call logs for suspicious activity. They can use blacklists to prevent users from installing known malware to their devices.

4. Backup Device Content on a Regular Basis

Just as you backup your computer data regularly, so should you backup data on your company’s mobile devices. If a device is lost or stolen, you’ll have peace of mind knowing your valuable data is safe and that it can be restored.

5. Choose Passwords Carefully

In the U.S., the average email address is associated with 130 online accounts. Those numbers are astounding, yet the average internet user reuses a handful of passwords to protect them all. Obviously, this lack of security awareness is what hackers count on to steal data. Use the following tips to ensure your mobile device passwords are easy to remember and hard to guess.

  • Require employees to change the device’s login password at least every 90 days
  • Implement two-factor authentication to verify a user’s identity
  • Passwords should be at least eight characters long and include uppercase and lowercase letters, numbers and special characters, such as asterisks, exclamation points and pound signs
  • Don’t use simple number sequences such as “12345,” or names of spouses, children or pets in a password. A hacker can spend just a couple minutes on a social media site to figure out this information.

Because of the convenience they offer, smartphones and tablet devices have become a constant presence in the modern business world. As usage soars, it becomes increasingly important to take steps to protect your company and its sensitive data from mobile threats, both new and old. Use our cybersecurity tip sheet for even more ideas to thwart would-be hackers. Just click the link below.

Lastly, even with the best security solutions in place, there’s never a 100% guarantee. It’s important to protect your company from the liability risks associated with a cyber attack, whether it be through an employee’s mobile device or your company server. Talk with a strategic risk advisor at McClone today to assess your risk and offer additional solutions.

Editors Note: This post was originally published in July 2019 and has been completely updated and revamped for accuracy and comprehensiveness.

New call-to-action

Zachary Kaiser, Strategic Risk Advisor

Zachary Kaiser has been a strategic risk advisor at McClone since 2015. Zach’s commitment to relationship building helps him form partnerships with commercial clients. He is a trusted consultant for managing and reducing risk. Zach’s philosophy on risk management is ‘while you want to have insurance, you also want to take steps to reduce the likelihood you will ever need to use it.” Combining his business knowledge and technical skills, Zach specializes in cyber risk. He works with organizations to challenge conventional thinking and finds innovative ideas to protect revenue sources while supporting strategic objectives. Zach holds a bachelor’s degree in journalism from the University of Wisconsin Oshkosh. He and his wife Emily and their two children live in Sheboygan.

What is a Waiver of Subrogation for Work Comp? Are there Risks?

May 20th, 2025|4 min. read

Your Experience MOD Factor Explained

April 28th, 2025|5 min. read
Closed sign

Does your cyber insurance cover contingent business interruption?

October 25th, 2023|2 min. read

Making Workplace Safety Tech Work for You

June 14th, 2023|2 min. read

Data Breaches vs. Cyber Liability – Are you protected?

June 1st, 2022|2 min. read
two men in hard hats training

10 Reasons Workplace Safety Training Is a Sound Investment

January 27th, 2021|2 min. read
data comparison points on graph

Metrics Help You Maintain, Improve Your Safety Program

January 20th, 2021|2 min. read
Hardening Market Insurance Premium Increase Chart

Insurance Insights: How a Hardening Market Impacts You

January 6th, 2021|2 min. read
man using smart watch and tablet

Making Workplace Safety Technology Work for You

August 5th, 2020|3 min. read

Learning from a Crisis: 5 Steps to Boost Business Success

June 24th, 2020|2 min. read
Construction site with crane and building-1

Most Common OSHA Violations in Construction (And How to Prevent Them)

June 3rd, 2020|3 min. read
work from home woman with laptop in kitchen

This is Not a Drill: Remote Work Reality Check & Tips for Success

March 27th, 2020|3 min. read

Marijuana in Workplace Part Two: Assessing Your Risk & Business Needs

February 26th, 2020|4 min. read
Circuit board with security lock

Cybersecurity is a Team Effort and Everyone Plays Defense

January 15th, 2020|4 min. read
crisis

Developing a Crisis Communication Plan for Construction

November 27th, 2019|4 min. read
signing the agreement

6 Important Construction Contract Terms You Shouldn’t Overlook

October 30th, 2019|5 min. read
Close up of businessman hand drawing sketches of buildings

Best Practices to Avoid Construction Cost Overruns

October 9th, 2019|3 min. read
Top 4 Technology Challenges in the Construction Industry

Top 4 Technology Challenges in the Construction Industry

September 25th, 2019|3 min. read
Solar panel on roof top

Green Building and its Impact on the Construction Industry

August 21st, 2019|3 min. read
Construction of a modern building and a skyscraper

Today’s Top 5 Construction Industry Risks

July 24th, 2019|3 min. read
iStock-512122746

What You Need to Know About OSHA Inspections

June 5th, 2019|3 min. read
business people group on meeting and presentation  in bright modern office with construction engineer architect and worker looking building model and blueprint  plans

Developing a Business Continuity Plan for Construction Companies

May 15th, 2019|4 min. read
Top View of Boot on the trail with the text Safety First2

Safety Program: Internal Audits and Self-Inspections

May 8th, 2019|3 min. read
Industrial worker working on machine in factory

What Manufacturers Need to Know About OSHA Rules in 2019

April 10th, 2019|3 min. read