FeaturedMobile Device Security Risk

Are Your Employees’ Cell Phones Exposing Your Company to Theft and Fraud?

By July 26, 2011July 23rd, 2013No Comments

Mobile Device causes security problems with sensitive company informationIn a recent white paper by Symantec “A Window into Mobile Device Security”, they found productivity of employees increased with the mass adoption of mobile devices in business also exposed companies to security risks.

Today’s mobile devices are a mixed bag when it comes to security. Engineers have attempted to build security directly into the operating system with features such as encryption and permission-based access control. On the other hand, these devices are designed for consumers and have traded off their security to ensure usability.

Unfortunately, researchers found their measures insufficient to protect sensitive company information that regularly finds their way onto these devices. One major complication is these devices synchronize and connect with third-party services and computers of unknown security outside of your company’s control. They are potentially exposing key information that puts your business at risk of theft and fraud.

Employees bring these devices into the work environment and it has greatly improved productivity. Without realizing any potential security threat, employees access corporate resources such as calendars, contact lists, company documents, and even email. In addition, employees often sync company information with third-party cloud services, as well as their home PC. This back door connectivity results in the loss of potentially sensitive information that is out of your control.

Even though employee productivity has increased because of these devices, your company must more effectively manage security risks.

Some ways to protect your business are to:

  • Not allow employees’ personal devices be in use while within the work environment;
  • Not to let business correspondence have any way of connection to any personal device owned by an employee;
  • Sensitive meeting rooms should have all electronic personal devices banned from entering;
  • Company-owned devices should be used strictly for business only.

All electronic devices should be part of and also included in any professional technical surveillance counter measures [tscm] sweep survey for possible compromises on any business with sensitive information to protect.