Story image

Working through the holiday season? Four ways to keep your mobile device secure

13 Dec 2017

As holiday season kicks in and offices lock their doors, some organisations and their employees will continue working remotely. To do this in a secure way, Ixia says that employees must not overlook mobile device security.

According to Ixia general manager Ardy Sharifnia, mobile security is especially important at this time of year because of the popularity of those devices.

“Cybercriminals know that employees can get caught up in the rush of the holiday season, making them potentially easy targets. Employees need to ensure their devices are well protected to avoid frustration and compromised data,” Sharifnia explains.

Ixia has prepared four tips that businesses can use to secure mobile devices through the holiday period.

1.  Check mobile networks  All devices connected to the Internet to share data are part of a network. Employees working remotely over the holidays need to ensure that the Wi-Fi network they are connecting to is legitimate and secure. The best way to do this is to check if the network requires a password. A password ensures encryption to prevent unauthorised access to sensitive data and other personal information.  2.  Beware of mobile applications  Employees often download applications for work that can open the door for malicious software. Laptops are more at risk due to their ability to install any software without being limited to a specific app store. Updating anti-malware and anti-virus software before the holidays can help detect threats that would otherwise go unnoticed, and help secure devices from harmful downloads and apps.  3.  Develop a strong password  Anyone can pick up an unprotected device and obtain sensitive information within seconds, which is why all devices should be protected with a strong password. A good password includes a random combination of letters, numbers, and special characters to make it harder for someone to guess. Remote employees should also look at personalising security settings, to automatically lock the screen of any device after remaining inactive for a minute.  4.  Ensure a solid IT foundation  Before the office closes for the year, IT staff should ensure all software, features, and security fixes are up to date. Checking for device updates will help secure devices and identify any holes cyber attackers can use to gain access. 

“Employees planning on working from mobile devices over the holidays should consider all the potential risks and take the proper measures to ensure their devices, data, and sensitive information is all protected. Cybercriminals don’t take holidays, so neither should security,” Sharifnia concludes.

Research reveals the state of AI in Australian businesses
While Australian organisations are concerned about the impact of AI on society, the research suggests Australian businesses could be doing more to minimise the potential risks.
AWS announces the general availability of AWS Ground Station
Once customers upload satellite commands and data through AWS Ground Station, they can supposedly download large amounts of data over the high-speed AWS Ground Station network.
Citrix to extend Workspace to Google Cloud
“In expanding our partnership with Citrix, we can better help these customers with their transformations by enabling them to access and run the applications their businesses depend on anywhere—simply, flexibly and securely.”
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
“First-of-its-kind” VR training platform launches in Oz
Curiious IQ is enabled for any VR device and can stream live to small groups or up to 50 or more headsets simultaneously.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."