4 Critical Steps to Defend Your Mobile Gadgets
Think about the most indispensible gadget you use for work — the one without which you cannot survive. I’m taking a calculated guess here, but I bet your list doesn’t include a photocopier, fax or even a desktop computer. Business people have become highly dependent on digital devices that keep them connected, efficient, flexible and independent no matter where they are. In other words, we are addicted to our mobile gadgets: iPhones, Droids, BlackBerrys, iPads, tablets, laptops and the corresponding Wi-Fi connections that link us to the business world.
To stay nimble and ahead of the game, we must be able to respond to any request (a call, email, social media post, text message), research anything (a client’s background, solutions to a problem) and stay current on what’s happening in our field of influence (breaking news, tweets) even when we are out of the office.
But the same gadgets that give us a distinct competitive advantage, if left unprotected, can give data thieves and unethical competitors a huge and unfair criminal advantage. The net result of organizational data theft can be devastating to your job security, your bottom line and your long-term reputation. The solution, of course, is to proactively protect your mobile office, whether it’s digital, physical or both.
Thieves Target Mobile Offices
What is a mobile office? If you own any of the gadgets listed above and use them even in minor ways for work (checking email, surfing, social media), you have a mobile office. Smartphones and tablets are more powerful than the desktops of just three years ago. Laptops are the bull’s eye for data thieves, though their attention is quickly moving to smaller, easier-to-steal gadgets. If you work out of your car, travel for your company or have a home office in addition to your regular workplace, you are a mobile worker.
Ignoring the call to protect these devices is no different than operating your office computer without virus protection, passwords, security patches or even the most basic physical protection. If you do nothing about the risk, you will get stung, and in the process, may lose your job, your profits and potentially even your company. The threat isn’t idle — I lost my business because I refused to acknowledge the power of information and the importance of protecting it like gold.
To protect yourself and your company from becoming victims of mobile data theft, start with the 4 Critical Steps to Defend Your Mobile Gadgets:
1. Make sure that employees aren’t installing data hijacking apps on their smartphones and tablets thinking that they are harmless games (like the Chess app that was pulled from the Android Marketplace because it was siphoning bank account logins off of users’ smartphones).
2. Implement basic mobile security on all mobile devices, including: secure passwords, remote tracking and wiping, auto-lock, auto-wipe and call-in account protection.
3. Only utilize protected Wi-Fi connections to access the Web. Free hotspots are constantly monitored by data sniffers looking to piggyback into your corporate website.
4. Don’t ignore non-digital data theft risks like client files left in cars, hotel rooms and off-site offices. The tendency to over-focus on digital threats leaves your physical flank (documents, files, paper trash, etc.) exposed.
To learn exactly how to implement these recommendations (and many more), check out the FREE webinar Cyber Attack: Data Defense for Your Mobile Office offered by Deluxe on January 31 at 2pm EST. By adding this date to your calendar, you may save yourself untold time, stress and money spent on recovery. You may register for the webinar here.
John Sileo is an award-winning author and international speaker on the dark art of deception (identity theft, data privacy, social media manipulation) and its polar opposite, the powerful use of trust, to achieve success. His clients include the Department of Defense, Pfizer, the FDIC and Homeland Security. Watch him on Anderson Cooper, 60 Minutes or Fox Business.This entry was posted in Featured, Identity Theft. Bookmark the permalink.