Wednesday, October 28, 2020

Ten best practices for improving mobile device security

The dynamics of mobility and teleworking have stimulated the appetites of cyber criminals, who have rushed on supposed isolated and destitute victims. According to Check Point's Security 2020 report, nearly 30% of businesses have experienced cyber attacks that have compromised the security of their mobile devices. This is why the publisher recommends ten best practices to help companies remedy possible security holes acca qualified.

1. Require user authentication.

The first defense is to prevent unauthorized access to the mobile device. It is therefore important to establish security measures such as locking the screen with a password or integrated biometric authentication. Thus, in case of loss or theft, the data is protected, and it is more difficult to access the device and the information it stores.

2. Encryption of data on mobile devices.

Data encryption is a fundamental solution to protect both the information stored on devices and that which is sent. To complete this protection, it is also advisable to use a VPN.

3. Update the operating system.

It is essential to have the latest versions available, both for the device system itself and the various programs and applications installed. Likewise, it is essential to regularly check to download and install the latest updates.

4. Avoid connecting to public WiFi networks.

This type of unprotected public connection poses a very high risk to corporate data because it is easily accessible to man-in-the-middle attacks. It is important to deactivate the “automatic connection” function.

5. Limit app downloads to trusted sources.

Downloading and installing any type of application that does not come from a trusted source, official app stores in short, can present a serious risk to the confidentiality of company information, as well as to the integrity of the device itself.

6. Save regularly.

To avoid the effects of ransomware attacks, it is essential to back up all information stored on the devices. This is a security measure that also helps to avoid the inconveniences associated with theft or possible loss of the device.

7. Remote locking and deletion of data.

In the event of theft or possible loss of a device, it is essential to implement tools to lock the device or even remotely delete the data it contains. This helps prevent unwanted access to sensitive corporate information.

8. Precautions against mobile phishing.

Check Point's report on branded phishing highlights that mobile phones are the preferred target for cybercriminals, with 23% of such attacks in the first quarter of the year were directed against smartphones.

9. Access to secure websites only.

When viewing a website from a mobile device, you must ensure that it is protected by an SSL security certificate (check for the presence of "HTTPS" before the domain name), which encrypts the data on the site. 'user.

10. Mobile device security audits.

It is important to periodically check the “health” of mobile devices to detect vulnerabilities and security holes that could pose a risk to the entire corporate network. 

No comments:

Post a Comment