Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Data Protection is Still Important, No Matter What We Write

b2ap3_thumbnail_mobile_data_security_400.jpgPrior to the XXII Olympic Games in Sochi, Russia, concerns were shared from many American news outlets in regards to mobile data security. On the eve of competition the NBC Nightly News with Brian Williams broadcasted a story suggesting that data security in Russia, and more specifically, at the Olympic games was atrocious; with the reporter, Richard Engel, getting both his smartphone and his work laptop hacked almost immediately.

We wrote a blog titled, "Hackers Go for the Gold at the Sochi Winter Olympics" that described this event, and the importance of using your head when taking advantage of your mobile device's capabilities to connect to unsecured or foreign WiFi connections. Subsequent to the broadcast of this report, several IT news services have intimated that the report was completely fabricated, with NBC hotly denying this. At Ferrum Technology Services, we don't want to publish fiction as fact. With that said, the blog post's theme, the best practices of mobile data security, is absolutely what we'd like all of our readers to completely understand.

To do this, we have compiled a list of five concepts every business owner and CIO should know, and communicate to their staff, about mobile data security. The list includes:

  • Make Careful Connections - Not all WiFi accounts can be trusted. To ensure the safety of the data on your devices doesn't get compromised, only use WiFi connections that you trust, and limit your Bluetooth use to situations where it is necessary.
  • Require Verification - Many mobile device management softwares allow administrators to require authentication before users can access the files using a mobile connection.
  • Control Third Party Software - By taking control of the applications on your employee's mobile devices, you have control of the computing environment. This gives administrators more control over the information that they want to share and the ability to wipe data off a device if need be.
  • Make Solid Device Choices - By being diligent about device purchases you can get devices that already have dedicated antivirus software and capabilities for data encryption to boost security of your data.
  • Consider Intrusion Prevention - Most mobile devices come equipped with the capabilities to report all traffic. This information can be useful to keep information secure and private.

For your organization to realize it's potential, you'll need to put in place resources that work to that end. At Ferrum Technology Services, we provide comprehensive IT solutions to many small and mid-sized businesses in the Nationwide area. We can select a mobile device management software that best meets your organization's needs and can provide you with the kind of technological expertise you can use to boost your company's performance. For more information, contact us today at (847) 697-3282.

Shouldn’t Everybody Be on the Internet? Yes!
3 Legal IT Solutions from the Ground Up
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, 25 April 2024

Captcha Image

Blog Archive

2024
May
June
July
August
September
October
November
December
2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code