Endpoint security has long been a worry of businesses, but the rapid proliferation of smartphones has added entirely new dimensions to this anxiety. It has even come to the point where the Federal Bureau of Investigation is releasing its own list of mobile device management tips via the Internet Crime Complaint Center. This 13-point safety guide suggests that users need to first know the features of their devices so that they can disable anything that could end up raising risks or triggering disasters.
This point-by-point list of advice also said mobile users should make sure data held in essential applications is encrypted, err on the side of caution when managing permissions and always protect the device with a password.
A couple of other tips from this FBI endorsed list tell people some things they don't know with regard to how their phones can damage their perceived level of security.
"Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware," IC3 said advised, adding that awareness of applications with geolocation need to be taken into account as well. "The application will track the user's location anywhere. This application can be used for marketing, but can be used by malicious actors raising concerns of assisting a possible stalker and/or burglaries."
Other quick tips include:
- Banning jailbroken devices from company networks
- Employing the same Internet security precautions on a phone as would be used when browsing on a laptop
- Steering clear of shortened or unfamiliar links
- Wiping the device before selling it or trading it in
- Connecting only to trusted wireless networks
Capturing these lessons in explicit policy
Dark Reading said companies everywhere are battling for how to harness the power of a BYOD (Bring your own Device) program without incurring undue risk. The website said companies can look to fix a lot of security pitfalls through having a clear and comprehensive policy for issues like lost phones, data theft and security software. Once this is figured out and employees know what is expected of them, the mobile network, and the assets it carries, will likely be much safer.