Secure Your Mobile Devices

Smartphones, tablets, laptops and other mobile devices are making it easier than ever for employees to be productive. But as their use grows. The threats to your data security also grows. Security breaches to mobile devices cost Small Businesses more than $200,000 on average according to CNBC. Severe Cyber Attacks can even drive a company out of business

Security experts and Law enforcement sources all state that small businesses are now victims of at least half of all cyber security breaches. According to The Cyber Security Breaches of UK businesses and charities. Almost half of businesses (46%) and a quarter of charities (26%) report having cyber security breaches or attacks in the last 12 months. And only about 30 percent of smaller companies have any type of employee training program in place to guard against and recover from breaches

Lack of Awareness

Most of the security breaches with Small Businesses can be attributed to their lack of awareness. The management seems to be unaware of the various security threats present on the Web. But not only the management, even staff and employees are unaware of the threats. More than 70 percent of employees leave their devices unsecured. Almost 35 percent of the participants in a survey said that cyber security is an “average” priority on their list. And in the same survey only 10 percent surveyed confidently agreed that they are “very knowledgeable” about advanced cyber security breaches. while 80 percent stated that they are only “somewhat” knowledgeable about the topic

Small Businesses are Not Immune

Two thirds of Small Businesses have suffered a cyber attack in the past 2 year. So much for the idea that small business are "Under the Radar". Attack campaigns have become so prevalent that if you didn't experience a cyber attack lat year count yourself lucky. According to Keeper Security and The Ponemon Institute, you are in the 33% minority. But do not count on beating the odds two years in a row. Especially since 7 out of 10 Businesses reported the attacks they are seeing are becoming more targeted, damaging, and sophisticated.

Email is the Worst

94% of malware is delivered via email
So how are Small Businesses being breached? According to the 2018 Verizon DBIR, the answer is almost always via email. Attackers use email as a direct line to the most vulnerable part of any business - the End User or your Employees. They no longer need to utilize the most sophisticated Exploits, Hacks and Bypasses when you can count on users being human and click on those links in emails! Malicious emails are no longer easily recognizable spam messages of the old days. They are often the simplest disguised messages. According to the 2019 Symantec Internet Security Threat Report (ISTR)
The most common malicious email disguises are:
Bills - Invoices (16%)
Email delivery failure notice (14%)
Package delivery (3%)
Legal - Law Enforcement Message (2%)
Scanned document (1%)

In the vast majority of cases malicious emails rely on tricking users into opening attachments with in emails. The most popular attachment type are Office files, which typically will not be blocked by email filters. According to the ISTR almost 50% of malicious email attachments are Office files  

information on hosting

 

Tips to Help Safeguard your Devices

Passwords

All employees should use Strong Passwords on all their devices. Which should have settings set up to be entered each time the phone is turned on or after a period of inactivity. Staff members Should log out of apps when not using that can access sensitive information

Encrypt Mobile Communications

The Small Businesses should require employees to use encryption for email and any other communication. Most all mobile devices include an encryption feature that can be turned on through the device’s “Options” or “Settings” menu or by following the manufacturer’s instructions

Use a VPN

The Small Businesses IT staff or consultant could set up a Virtual Private Network. This would provide a secure connection to transmit data. Once set up Require all employees to use it when accessing resources on the companies WIFI network. You can read RSH Web review on Nord VPN here

Implement a BYOD Policy

"Bring Your Own Device" Because many employees use their personal devices at work. The company should implement a policy with guidance on how these devices should be used during working hours. For example Allowing the use of specific navigation apps while prohibiting visits to certain websites such as those that contain Flash and Flash cookies. Any website that asks you to upgrade ANYTHING. Do not walk - Run from these sites

Train your Employees to be Vigilant

Along with the BYOD policy you could emphasize the importance of password protecting phones, recording their device serial numbers and simply keeping a eye on them especially when they are used outside of work

Enable Remote Lock and Wipe for Devices

The employees should learn how to lock and wipe data from their devices remotely. This can keep sensitive information from being accessed if the devices are lost or stolen
We have more information about locking and wiping data here
And Goggles Find, lock, or erase a lost Android device
Motorola mobile Erase your personal data
Apple How to erase your iPhone, iPad, or iPod touch

Mobile Device Management System

"MDM" This type of system would allow managers to monitor the devices when the sales staff is on the road. It would also provide a central point for remotely locking and wiping devices, should one go missing. You can read more at the Wikipedia Website

Keep your Operating Systems Updated

You heard it before and you will hear it again. So just do it. Managers could advise employees to be sure their devices are set to check for security updates automatically. This can help provide protection for data outside of the companies firewall

Back Up Data

To protect your sensitive product information and customer files. You should be using a backup service or device, such as an external hard drive. Some mobile devices will include backup capabilities for storing messages, contacts, and other data to a Secure location

Security Breaches Hurt Small Businesses

It might not surprise you that security breaches do hurt small businesses the most. More than 75 percent of cyber attacks target small businesses. It is estimated that more than 50 percent of hacked small businesses go out of business with in six months. Also keep in mind that the numbers are probably wrong since the number of people ignorant about cyber security is very high. People still consider traditional security measures like anti-viruses and firewalls completely efficient. If we helped even one business with this growing problem. The time spent in writing this blog is more than worth it
The RSH Web Editorial Staff

Tweet  Share  Pin  Tumble  Email

 

Recent Posts