Why mobile security is even more important on work devices

Ensure your business is protected out of work hours

5Jul

In 2017, more than 1.5 million pieces of malicious software were found by Kaspersky Lab, targeting mobile phone internet usage. Like computer malware, sinister packages inject themselves into your phone, slowly extracting personal information and behaviors from the device. This exploitation transcends across all computing devices. So, with Trojans lurking just outside the doors of your firewalls, consider what is at stake and why you should be savvier when it comes to your work phone.

Smartphone usage has been trumping any other device since 2015, with 33% of internet users choosing to browse using their smartphone over laptop or tablet, many businesses now opting to assign work mobile phones to their employees. This offers relaxed flexibility with the ability to work longer hours, not always in an office environment, but from home and in cafés.

How critical are operating system updates on mobile phones?

iPhone users are suspicious to update their phone due to past track records of new iOS updates purposefully slowing down older devices (or simply not having enough space to download the update), many simply do not bother. The same goes for Android users, with 82% of Android devices having versions on their phones that are more than two years old.

Phone updates are a hassle, it can take a long time and there’s a risk of potential glitches that need their own follow-up updates. However, the updates are critical to the overall security of your device. Apple and Google hire people just to hack into their devices to seek out flaws in their systems. Prioritize your work phone system updates just as much as you would your own mobile to ensure safety as you roam. Avoid being completely phoneless for that excruciating amount of time that isn’t five minutes by updating your work and personal phone at different times.


Visit Innovation Enterprise's Chief Strategy Officer Summit in Sydney on September 17-18, 2018


Is fingerprint recognition safe?

It’s a good idea if you plan to set up fingerprint recognition on your smartphone to register only one finger or thumb to reduce the chances of someone else being able to hack your phone. Although unique, Nasir Memon of New York University has said it is a lot easier to falsely match with a fraction of the print on multiple fingers. It also goes without saying you should always ensure that your phone is locked if it's not being used, unlocked phones invite unauthorized access.

Passcodes can offer a safer option. It is ideal that you opt for the longer passcode option rather than four figures, which is an easier sequence to crack more quickly. Consider settings like wiping your phone after multiple failed attempts to unlock the device. Especially if you’re likely to be dealing with highly important information through your work phone.

How can limiting notifications increase security?

As a work phone, you’ll be receiving a lot of important emails and texts. We appreciate you will want to always remain in the loop. However, decreasing the amount of notifications that are pushed to your lock screen is a good idea to ensure nothing confidential or sensitive is right there for anyone to see at the click of a button. Yes, they may not be able to physically access the files to read in full as long as you’ve enabled passcodes and other security passes. But it could be enough to land you in hot water, or for someone’s interest to be piqued enough to try and access your work phone.

Do you always log out of your social media accounts?

Malware isn’t always the biggest danger out there. It seems like an obvious precaution to take, but many leave their profiles ticking over in the background, not thinking about the damage done if your device is physically stolen. It goes without saying you probably shouldn’t be using your work phone to access your personal social accounts. Not least because it is opening you up to your social networks being infiltrated if you’re not careful from yet another device.

However, if you do use it to access those accounts, or you’re in charge of managing the business’ Twitter, Facebook and Instagram profiles, ensure you always log out after. Personal use could also end in severe repercussions, especially if your own accounts are full of less than professional content that doesn’t showcase you in such a great light.

With another device logging your day-to-day, nine-to-five working life, mobile phone usage brings about its own unique dangers. Ensure you’ve got every possible security option in place, including passcodes, software updates and, perhaps one you’re not considered as much as you should, being conscious of exactly how you’re utilizing your device for work.

Phone small

Read next:

How health apps promise to reshape healthcare

i