Tips for securing your mobile business devices

Businesswomanin with smartphone and folder of documents in her hands outdoors

As businesses continue to leverage smartphone technology to communicate both internally and with customers, it’s important to consider how your devices are protected against cyber attacks. Cyber threats like malware or phishing attacks don’t just happen on computers, but they also happen on mobile devices and tablets. 

If your staff use their devices to access your business’ intellectual property or client information, reviewing the measures you have in place to secure them can help you flag vulnerabilities that could put your data at risk. This review is particularly important if your team also accesses personal information or have personal apps downloaded on their devices.   

Simple security procedures to follow

All businesses, regardless of size, can be at risk of cyber attacks. While many smaller businesses may not have a formal security role or a dedicated team to assess and mitigate risks, there are some simple tips you can share to help protect your data. 

1. Stay clear of public Wi-Fi

If you connect to public (or free) Wi-Fi, you are connecting to a network with no formal authentication. This provides ample opportunity for cyber criminals to gain access to unsecured devices. 

One way they can do this is with ‘Man-in-the-middle’ attacks, which happen when hackers position themselves between your device and the network connection to collect data you share on the public Wi-Fi. That means that anything you send out via an unsecured network – emails, client documents, credit card details – could be seen by a hacker as if they were you. 

Malware can also be distributed via public Wi-Fi networks by hackers. This means that if your team shares files while connected, a hacker may be able to inject infected software on your computer. 

How to avoid this? Stay clear of public Wi-Fi. 

2. Create strong passwords

An easy but effective way to protect device information is to create strong passwords. Introducing password policies, and implementing a quick checklist for your team when creating effective passwords can be one of the simplest ways to help prevent cyber attacks.  

The following steps can assist you and your team as you protect your devices with effective passwords:

  1. Avoid single words and use phrases instead 
  2. Don’t include personal information like birthdays or names 
  3. Include symbols and numbers 
  4. Don’t reuse passwords

A Password Manager may be a good investment if your business uses multiple applications – not only for security reasons, but also to help in shortening the time it takes to login to various systems. They can be handy for your team, as this software creates unique passwords and stores them in a single, secure location. 

3. Set up two factor authentication

Incorporating two-factor authentication (2FA) is a way you can begin to implement a layered mobile security strategy. As cyber crime becomes more sophisticated, creating a strong password may not be enough. 2FA acts like a back-up check, and helps make sure that the person trying to login to an online account are who they say they are. After typing in your username and password, 2FA prompts people to provide more information that no one should be able to answer. There are many options available for 2FA, so you can select a solution that is suitable for your business. 

4. Look out for dodgy links

Phishing occurs when scammers send malicious links via email or text message. These scams are becoming more advanced, and it’s harder to spot the difference between real and malicious links. If you receive a link that looks slightly suspicious, make sure not to click it. If the matter is urgent, call the sender directly to confirm the link was sent by them before taking action. 

5. Make updates a priority

Updating software is important, as each new update is a new, improved and safer version of its predecessor. Software that’s out of date can create cracks in your security, so updating software should be a priority. 

To stay on top of updates, and to limit potential vulnerabilities, you can set minimum update requirements for devices that can access corporate systems and applications. This helps any weaknesses or threats be identified sooner, reducing the risk of data breaches. 

Securing your business with TBTC Victoria East

The team at TBTC Victoria East can provide tailored advice to help you make a plan for protecting your devices. Our technology advisors take the time to understand your business, implementing solutions that work for your business today, and into the future. Let’s get planning and protecting. Talk to us today.

Ready to learn more? Let’s talk.

  • THINGS YOU NEED TO KNOW: By clicking Send, you are permitting Telstra Business Technology Centre Victoria East to contact you via the details you provide, regardless of any other contact preferences you have expressed to us or Telstra. Your name and other details you provide with your message will be used only for the purpose of responding to your message. No data is stored on this website. Please see Privacy at Telstra for more information on how we manage personal information.
  • This field is for validation purposes and should be left unchanged.
Scroll to Top