Do you look at your work email on your personal smartphone? Do you regularly click links and attachments sent from third-party contacts? Download documents to your tablet? If yes, then you’re putting your organisation at serious risk for a security breach. All of these tasks seem innocent enough, but when they’re done on devices that are not assigned to you by your employer, you open the door to bad actors to gain access to sensitive data.
So, what can you do to be part of the solution rather than creating a potential problem?
- Ask your employer if they have a mobile device management solution that offers geo-fencing. Your organisation can set up a perimeter to keep devices from sharing corporate documents or sensitive information when a threat has been detected. It can protect hybrid workers and give your employer peace of mind.
- See something, say something. If you receive a suspicious email or believe you’ve been the target of a phishing attempt, let your IT team know as soon as possible. Avoid the temptation to click any links sent to you by unverified contacts.
- Keep your mobile devices updated. Mobile device software manufacturers typically do a good job providing security updates to known vulnerabilities, but they rely on you (the mobile device owner) to install the updates. So ensure you install the latest operating systems or do any updates needed to keep your device safe and secure. And if your device is on an operating system that’s no longer supported, please refrain from using it for work purposes.
Working hybrid on our mobile devices is convenient, but it also comes with risks. It’s important to keep what’s at stake in mind and do whatever is necessary to keep corporate data secure.
At TechComms, we work with some of the leading b2b tech companies in the cybersecurity space. If you’d like help developing a mobile device management policy, please contact TechComms, a b2b tech marketing and communications agency on + 44 (0) 203 322 8928 to build a programme that meets your needs.