• EG Conley Home
  • Why EG Conley
    • Business Performance Advisors
    • Strategic Performance Plan
    • The Principa Alliance
    • Our Team
  • Our Services
    • Business Performance & Growth
    • Performance Benchmarking
    • Tax Services
    • Audit
    • Business Valuations
    • Succession Planning
    • Peer Reviews
    • Retirement Plan Services
    • Payday Solutions
  • Tax Tools
    • Tax Tips
      • Individual
      • Business
      • Financial
    • Tax Rates
    • Due Dates
    • Financial Tools
    • Retention Guide
    • IRS Forms
  • Events
    • Summits & Webinars
  • News
    • Monthly Newsletter
    • Daily News
  • Contact Us
    • Careers

EG Conley Blog

Making your business more valuable.

  • Blog Home
  • Tax Tips
    • Business
    • Individual
    • Non-Profit
    • Payroll
  • Business Performance
  • QuickBooks
  • Accounting
Home Business Management Reinforce protection of your company’s mobile devices

Reinforce protection of your company’s mobile devices

Posted on October 6, 2020 Written by EG Conley, PC Leave a Comment

Whether it’s a smart phone, tablet or laptop, mobile devices have become the constant companions of today’s employees. And this relationship has only been further cemented by the COVID-19 pandemic, which has thousands working from home or other remote locations.

From a productivity standpoint, this is a good thing. So many tasks that once kept employees tied to their desks are now doable from anywhere on flexible schedules. All this convenience, however, brings considerable risk.

Multiple threats

Perhaps the most obvious threat to any company-owned mobile device is theft. That could end a workday early, hamper productivity for days, and lead to considerable replacement hassles and expense. Indeed, given the current economy, thieves may be increasing their efforts to snatch easy-to-grab and easy-to-sell technological items.

Worse yet, a stolen or hacked mobile device means thieves and hackers could gain possession of sensitive, confidential data about your company, as well as its customers and employees.

Amateur criminals might look for credit card numbers to fraudulently buy goods and services. More sophisticated ones, however, may look for Social Security numbers or Employer Identification Numbers to commit identity theft.

5 protective measures

There are a variety of ways that businesses can reinforce protections of their mobile devices. Here are five to consider:

1. Standardize, standardize, standardize. Having a wide variety of makes and models increases risk. Moving toward a standard product and operating system will allow you to address security issues across the board rather than dealing with multiple makes and their varying security challenges.

2. Password protect. Make sure that employees use “power-on” passwords — those that appear whenever a unit is turned on or comes out of sleep mode. In addition, configure devices to require a power-on password after 15 minutes of inactivity and to block access after a specified number of unsuccessful log-in attempts. Require regular password changes, too.

3. Set rules for data. Don’t allow employees to store certain information, such as Social Security numbers, on their devices. If sensitive data must be transported, encrypt it. (That is, make the data unreadable using special coding.)

4. Keep it strictly business. Employees are often tempted to mix personal information with business data on their portable devices. Issue a company policy forbidding or severely limiting this practice. Moreover, establish access limits on networks and social media.

5. Fortify your defenses. Be sure your mobile devices have regularly and automatically updated security software to prevent unauthorized access, block spyware/adware and stop viruses. Consider retaining the right to execute a remote wipe of an asset’s memory if you believe it’s been stolen or hopelessly lost.

More than an object

When assessing the costs associated with a mobile device, remember that it’s not only the value of the physical item that matters, but also the importance and sensitivity of the data stored on it. We can help your business implement a cost-effective process for procuring and protecting all its technology.

© 2020

Filed Under: Business Management

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Facebook
  • LinkedIn
  • Tumblr

Search the Blog

Subscribe

Get the Adding Value email newsletter

We never share your email address. Opt out at any time.

Tags

ACA Accounts Autos Benefits Capital Gains Cash Flow Charity Credits Customers Deductions Depreciation Divorce Education Employees Estimated Tax Forms Goals Health Insurance HRAs Income Internal Controls IRAs IRS KPIs Life Insurance LLCs Losses Overtime Partnerships Passive Payroll Planning Profit R&D Regulations Rentals Sales & Exchanges S Corps Section 179 SE Tax State Travel Trucks Withholding

Copyright © 2025 · Focus Pro Theme on Genesis Framework · WordPress · Log in