Photographs: Reuters Shantanu Ghosh
The season for holiday travel begins soon. As we create our checklists while planning our vacations, here's one more item to tick-off -- smartphone security.
Here's the connection: as you and your colleagues take some well-deserved time off, will you be taking smartphones with you? Of course, you will.
And chances are you will be accessing corporate data. In fact, the 'Symantec Security Check: Indian Financial Services Industry 2011' revealed that 81 per cent of smartphone users in their organisations access corporate information.
With a variety of looming threats, from unsecured networks to malicious apps, corporate smartphone users should carefully consider what they can do to make sure a vacation from the office doesn't turn into a vacation from security.
. . .
How to keep your smartphone safe from cybercriminals
The following best practices will help you keep mobile devices secure:
Use the 'passcode lock' feature, and make sure it features a secure password: This may seem obvious, but 18 per cent of smartphone users globally do not use the passcode lock feature.
This is the most basic security precaution and requires minimal effort on the part of the user.
Encrypt the data: Only allow devices that support encryption, ensuring that in the event a device is lost or stolen, nobody will be able to access the corporate data it contains.
. . .
How to keep your smartphone safe from cybercriminals
This can reduce a potentially costly data breach to simply the need for equipment replacement.
Use a mobile device management solution: Today smartphones and tablets are being used the same way as laptops and PCs in which they are accessing email, using enterprise apps, and accessing corporate servers.
As a result, the device and apps need to be managed through the entire device lifecycle from device provisioning to securing and monitoring to device retirement.
Use security software and keep the OS and apps up to date: While most businesses provide security software for work-related smartphones, 42 per cent of business smartphone users across the world are unaware whether their company provides any, according to another Symantec survey.
. . .
How to keep your smartphone safe from cybercriminals
Provide security software and establish policies regarding patches and updates. Users should be sure to closely adhere to established guidelines.
Follow employer-specified practices: Any mobile device that accesses sensitive corporate information should be subject to corporate policies.
Consider emerging threats: While traditionally the greatest threats to mobile security have been physical loss or theft of devices, hackers are increasingly turning to apps.
In many cases, these originated as legitimate apps. Hackers download them, insert malicious code, and repost them.
. . .
How to keep your smartphone safe from cybercriminals
Users notice no difference in functionality, but the app performs malicious activity in the background.
Users should avoid jailbreaking or rooting their devices since it makes the devices more susceptible to mobile threats.
Users should also exercise the same level of caution they do on PCs and laptops.
If they receive a strange MMS with an attachment or link, they should be cautious before opening the attachment or link.
. . .
How to keep your smartphone safe from cybercriminals
Mobile devices represent an important juncture between corporate and personal data.
With 73 per cent of Indian enterprises experiencing an increase in smartphones connecting to the network, according to a Symantec survey, and the lack of corporate control over mobile carrier networks, security threats are less a matter of 'if' than 'when'.
IT managers and mobile device users can work together to establish and adhere to policies that will keep data secure at the local coffee shop, the airport and the beach.
After all, even though you may be taking a few days off this festive season summer from the daily grind, cybercrime doesn't take a vacation.
The author is vice president and managing director, India product operations, Symantec.
article