Tips to help secure your mobile device security

Colleagues gather around to discuss ideas and designs for the latest collection

As businesses continue to leverage smartphone technology to communicate internally and with customers, protecting these devices against cyber attacks is ever-relevant. These considerations are especially important if your staff access intellectual property or client information via their devices. 

Cyber threats like malware or phishing attacks don’t just happen on computers – they also happen on mobile devices and tablets. Not only is this a threat to your important business information, but also to your team’s personal information if they are using personal devices.  

Making security simple for your team 

While smaller businesses may not have a formal security role or a dedicated team to assess and mitigate risks, all businesses, regardless of size, can be at risk of cyber attacks. 

If your team uses mobile devices to connect, collaborate, and access your work files and applications, there are some simple tips you can share with them to help protect important data. 

1. Don’t use public Wi-Fi

Connecting to public (or free) Wi-Fi means connecting to a network that requires no authentication. This creates a perfect opportunity for hackers to gain access to unsecured devices. Public Wi-Fi can allow hackers to position themselves between your device and the network connection in what’s known as a ‘Man-in-the-middle’ attack. Emails, client documents, credit card details – everything you send out via an unsecured network – can be accessed by a hacker as if they were you. 

Hackers can also use public Wi-Fi networks to distribute malware. So, if your team initiates file sharing while connected, a hacker may be able to plant infected software on your computer. 

Ultimately it is recommended that public Wi-Fi is avoided as much as possible, and only used when absolutely and when not while dealing with sensitive data.

2. Set strong passwords

One of the simplest yet effective ways to protect information on devices is to set strong passwords. Implementing password policies, and providing a quick checklist for your team on how to create effective passwords can be one of the most cost-effective ways to help prevent cyber attacks.  

To help you and your team better protect their devices, follow these simple steps to create effective passwords:

  1. use phrases rather than single words 
  2. avoid personal information like birthdays or names 
  3. add symbols and numbers 
  4. don’t reuse passwords.

If your business uses multiple applications, a Password Manager can be a good investment – not only for security reasons, but also to reduce the time it takes for your team to login to various systems. Password Managers create unique passwords and store them in a single, secure location. 

3. Use two factor authentication

If you don’t use two factor authentication (2FA) already, incorporating this into your processes can help you begin developing a layered mobile security strategy. In an environment where cyber crime is becoming more and more sophisticated, sometimes creating strong passwords is simply not enough. 2FA is a back-up check that helps make sure people trying to gain access to an online account are who they say they are. After entering your username and password, 2FA will prompt you to provide another piece of information that no one aside from you should be able to answer. There are many different types of 2FA software available, so it’s important to select a solution that’s appropriate for your business.

4. Look out for suspicious links

When scammers send malicious links via email or text message (as examples), this is called phishing. Hackers are much more advanced in the quality of these attacks, making it harder to decipher between real and suspect links. Never click a link if it looks suspicious, unfamiliar or unsolicited. If a suspicious email looks to be addressing an important matter, don’t hesitate to call directly to confirm the “sender” to confirm it is legitimate before taking any further action.  

5. Prioritise updates 

Each new software update is a new and improved, or safer version of its predecessor. Out of date software may create cracks in your device’s security, so it’s important that these updates are activated.

To help make sure updates aren’t missed and to limit vulnerabilities, it’s a good idea to set minimum update requirements for the devices that are allowed to access corporate systems and applications. This helps pick up on any weaknesses or threats and reduce the risk of data breaches. 

How TBTC Melbourne South can help secure your business

At TBTC Melbourne South, our technology advisors can provide tailored advice to help you make a plan for protecting your mobile devices. We take the time to understand your business, so we can identify solutions that work for your business today, and into the future. Let’s get planning and protecting. Talk to us today.

Ready to learn more? Let’s talk.

  • THINGS YOU NEED TO KNOW: By clicking Send, you are permitting Telstra Business Technology Centre Melbourne South to contact you via the details you provide, regardless of any other contact preferences you have expressed to us or Telstra. Your name and other details you provide with your message will be used only for the purpose of responding to your message. No data is stored on this website. Please see Privacy at Telstra for more information on how we manage personal information.
  • This field is for validation purposes and should be left unchanged.
Scroll to Top