Do You Trust This Device? Best Cross-Device Practices

Mobile has changed everything in the past few years. It has improved productivity and transformed the way we share information. Our working world can't function without mobile. In fact, 82 percent of organizations support a bring-your-own-device (BYOD) policy. Which is why, unsurprisingly, mobile has increasingly become a target for hackers.

In fact, ZK Research analyst and writer Zeus Kerravala describes mobile devices as the biggest cybersecurity threat to your business.

In an article for NetworkWorld, he writes, " In actuality, it's not 'BYOD' that's the real problem. It's the fact that these devices are mobile and can be connected from virtually anywhere, " even from an unprotected or fraudulent network.

But this is no time to panic. It's time to reevaluate your mobile security practices and take the necessary steps to ensure your company's most valuable assets are protected.

Protect your mobile device: Some security threats aren't necessarily sophisticated. Risking your company's information can be as simple as losing your phone or leaving your tablet in a coffee shop. Enabling a PIN or screen lock can keep prying eyes from your private information. Similarly, improving your passwords can be enough to dissuade some hackers looking for an easy target. Take extra care by enabling remote wipe for mobile devices.

Be careful where and how you connect to Wi-Fi: Many people mistakenly believe that their iPhone or Android devices are secure by default, but in reality it's up to the user to make better choices. Free Wi-Fi is very convenient, but connecting to an open network could provide cybercriminals access to all the information going to and from your mobile device. Enabling mobile encryption software will help prevent your data from being shared with unauthorized devices.

Avoid suspicious links and applications: Sketchy email attachments and links have threatened businesses for years. A careless mouse click was all it took for a hacker to take over your organization. Now those same Trojans and malware programs are lurking in your SMS. By connecting your infected mobile device to your work computer or network, you could be putting your whole company at risk. Bottom line, be extra careful when downloading apps or opening links from sources you do not know well.

Discuss best practices with your employees: Did you know the number one cause of data breach is employee negligence? Talk with your employees about mobile security. Sure, it may be annoying to get everyone in the office to change their passwords and eschew free Wi-Fi, but nothing could be more problematic than trying to track down the source of your data breach.

Invest in cyber risk insurance: Securing your mobile devices is vital, but what happens if a hacker still gets through? Will it spell game over for your small business? In 2015, 43 percent of small businesses suffered cyberattacks, and the average loss per business was $180,"000. You can see why it is absolutely crucial to invest in cyber risk insurance.

Want to keep your company's most valuable assets secure? Cyber risk insurance from CyberPolicy covers the costs of security breaches, data loss, extortion and business interruption. Visit CyberPolicy today, get a free quote, and see just how affordable insuring your business can be.

© 2016-2020 CyberPolicy, Inc. All rights reserved. CyberPolicy®, "Plan. Prevent. Insure."™, and "CyberCheckup"™ are trademarks of CyberPolicy, Inc.
DBA: CyberPolicy Insurance Solutions CA License No. 0L13180
DBA: CoverHound Insurance Solutions CA License No. 0H52375