ITConsulting VCIOHero keyboard phone headset

Introduction

In this blog, we continue our series in how to secure wireless devices at your place of business.

How to Secure Mobile Devices in Your Environment

1)  Always test your mobile security policy and threat landscape before implementing it:

Before you start to implement and enforce your policies, it is always important to evaluate them first in a test environment to see how they will work in a real-world environment. Some technical examples of what needs to be tested includes the following:

  • The connectivity of the wireless devices that will be issued to each employee;
  • Checking the safety of the functionalities of the mobile apps that will be installed and used on the wireless devices;
  • Checking out the performance of each wireless device (obviously, a wireless that does not live up to the performance metrics that have been set forth could prove to be a security vulnerability at a subsequent point in time);
  • Making sure that the wireless devices that you will be acquiring and issuing to your employees are very difficult to jailbreak or be rooted;
  • Making sure that the wireless device does not accidentally revert to the vendor settings; but rather to the default settings that you have set forth in your mobile device security policy.

2) Secure each mobile device before they are issued to your employees:

Once you, the IT staff, as well as the CIO are satisfied with the test results from the procedures conducted in the test environment, then the next step is to make sure that the wireless devices that you will be distributing to your employees have all the security functionalities installed onto them.  Obviously, this will vary from business to business, and in the specific way the employees will be using them.  But, in general:

  •  Make sure that the initial password you establish is hard to guess, but easy enough for your employee to remember. This can be a lot trickier to do than it sounds, thus you may want to consider using a mobile based Password Manager in this regard.
  •  Make sure that Two Factor Authentication (also known as “2FA”) is installed.  The first layer of security will obviously be the password, but the second layer could be a challenge/response question.
  • Check the website of each wireless vendor from whom your organization will be procuring the wireless devices for the latest firmware and software upgrades/patches. Make sure they are installed and configured once again, on each wireless device before they are issued to your employees.

3)  Always enforce your mobile device security policies:

Once you have initially deployed all the wireless devices to your employees, the next step is to make sure that the policies you have set forth are constantly being enforced and that your employees are abiding by them.  One of the best ways to do this is to, at random time periods, is to conduct a manual audit of these devices, to make sure that there is no misuse by the employees.  Remember that in this regard, you have every right legally to conduct such audits because these are wireless devices that owned and facilitated by the organization that you work for.  Another key issue at stake here is Bring Your Own Device, or “BYOD” for short.  For example, they can be no gray area whatsoever in this regard.  If you want your employees to  strictly use company issued wireless devices, then you must state so, and forbid your employees from using their own Smartphone to conduct work related activities.  But on the other hand, if you are OK with employees in using their personal Smartphones, then you must set forth and establish very clear guidelines in the way they can be used for conducting every day job functions. Remember, BYOD brings along with its key security vulnerabilities, and you may not be easily able to conduct random security audits on them because these wireless devices are personally owned by your employees.

Other kinds of activities that should be included here include the following:

  • Conducting various Pen Testing exercises in order to unearth any unknown anomalies and security vulnerabilities;
  • Keeping an accurate inventory list of all the wireless devices that have been issued and returned (and in the case of the latter, deleting all permissions after an employee is no longer with the organization);
  • Checking for firmware and software upgrades/patches at least once a week;
  • Making sure that there are no rogue, or unauthorized mobile apps installed on company issued wireless devices.

Conclusions

In our next blog, we wrap up our series on how to secure your mobile device environment by examining other factors that you need to consider as well.

27 thoughts on “Deploying Mobile Devices Securely pt.2

  1. It is recommended that all IT service whether. in phone or computers are needed to be check by IT personnel for its use. It must be test to make sure the security of the company and everyone must abide in the rules and regulations imposed in them.

  2. I do not know if mobile would really need an IT Service but I always practice one thing against attacks. Stay away from shady activities as much as possible. Simple but is very effective, I would say.

  3. Securing mobile devices at our work places..this article is a boon for most companies..a good IT Service Support is important for all companies

  4. Given the complexity of deploying mobile devices in the work place it is advisable to conduct some thorough IT Consulting before embarking on the deployment. This ensures that all bases are covered in terms of deployment preparedness.

  5. There are so many things to consider when rolling out mobile devices for employees in a company. The process can be best handled through IT Outsourcing.

  6. Enlisting help from a Los Angeles Managed Service Provider like Be Structured can hasten the process of mobile devices deployment within an organization. This is because they are familiar with everything that needs to be considered during such a delicate process.

  7. Thanks a lot for the very informative write-up on factors to consider when deploying mobile devices. Any Computer Company will find this information extremely helpful.

  8. IT Service and Support structures within an organization should be careful when rolling out mobile devices not to omit any of the things discussed in this article. Doing so could prove to be very problematic in the future.

  9. This is a real concern on public places. Who knows who might be snooping at your data and files. This is why IT Service Support should also be in the mobile field. Phones are computers as well.

  10. Los Angeles Managed Service Provider here for issues of this nature , if a business is finding it difficult to deploy mobile phone effectively into their business to avoid attacts then getting professional help would just be it.

  11. An important point to note especially by the IT Service & Support teams of any company is to always enforce the mobile devices security policies. Neglecting the policies can lead to disaster.

  12. The IT Service Support system of an organization should always be updating their mobile device policies to keep up with the trend. The policies should not be enacted to be stagnant.

  13. It is the prerogative of every Computer Company to formulate a mobile devices policy that works for the company and the employees. That said, the article is very informative on how to go about this and I appreciate you sharing this 🙂

  14. Through IT Outsourcing in Los Angeles, any company can easily design a good mobile devices policy. You can never go wrong if you leave the job to the professionals.

  15. I am of the opinion that IT Consulting should be done before going the mobile devices way. Inasmuch as it sounds like a novel idea, it may not necessarily be the best move for every company.

  16. Good observations and pointers for a healthy network system. All IT services in the LA area should implement these safety precautions and remind employees to only use issued devices. Once every device can be accounted for, there will be much less risk of a cyber breach or miscellaneous activities.

  17. Good thing that these guys are giving IT services in the LA area. I wish they go global ASAP because each nation needs this. Besides, it is good for business since you will have global clients.

  18. IT Services in California, here is one of the best way to secure mobile devices stated in this article published by Be Structured Technology: Making sure that there are no rogue, or unauthorized mobile apps installed on company issued wireless devices. Thanks for sharing!

  19. This is quite an interesting read. I learned a lot about mobile devices just by reading the two parts of this. This group is definitely one of the best Los Angeles IT Services that I’ve ever read.

  20. Part 1 of this article was a real guide, now the part 2 is really changing thing for good. Every mobile device user should always test mobile security policy and threat landscape before implementing it, and evaluate it to test environment to see how they will work in a real-world environment. Los Angeles Computer Company and BeStructured Technology Group, you have really done perfectly well for this article. Thanks a lot once again.

  21. The only Los Angeles IT Services company that renders the best services out there. if you want to deploy your mobile stuff and you need help then stop by Bestrucured technologies.

  22. Times are changing and IT companies must be moved with it. Not checking out if a mobile app can be vulnerable to an attack can bring disaster to a setup of your company. If you can never tell because you might not know then consult with Los Angeles IT Consulting service.

  23. I agree with the previous comment We are in a digital age so IT Service & Support must move along with with it . At home or everywhere at this point tech is very visible. As for me though I am contented with my regular phone. Texting and calling is enough for me.

  24. Ensuring the mobile device security policy will make it easier to scrutinized the gadget. Thanks Be Structured Technology. If you need assistance in getting the policy right, get in touch with the Los Angeles IT Outsourcing

  25. Securing wireless devices are essential for all organizations and individuals using it. Always test your mobile security policy and threat landscape before implementing it. Keeping an accurate inventory list of all the wireless devices that have been issued and returned (and in the case of the latter, deleting all permissions after an employee is no longer with the organization). All thanks goods to BeStructured Technology Group and Los Angeles Managed Service Provider for the educational material.

  26. Everything is connected nowadays, even down to wireless devices that are now increasingly becoming more important as part of any organization’s digital backbone structure. It’s always good to be on top of the game, and any excellent Los Angeles IT Support could provide what they need with the deployment of more secure mobile devices to keep everything well protected.

  27. Everything is now part of technology. From major stuff such as banking ti the most minuscule like talking. Security is with no doubt needed more than ever. Fortunately a good IT Service & Support can be used for this. But, it is still limited to PC at this point. At least for the most part.

Leave a Reply

Your email address will not be published. Required fields are marked *