By accepting you will be accessing a service provided by a third-party external to

The ABC(DE)s of Mobile Security

The ABC(DE)s of Mobile Security

As of September of 2019, research conducted by Verizon states that almost half of enterprises--half--are willing to sacrifice their mobile security in order to gain “advantages” in speed and productivity. This marks an increase from just 2018, when this metric measured at a still-too-high one-third of enterprises. Of course, such behaviors could bring severe consequences. 

That’s why we wanted to share how your business could exercise mobility, while still preserving security.

Why You Aren’t Safe as a Small/Medium-Sized Business

Once upon a time, cybercrime was a simple animal. A target was picked, and the method of breaching it was developed. This meant that the smart strategy for cybercriminals was to focus their efforts on larger targets, as breaching them would be more profitable for cybercriminals to take the time to do.

Unfortunately for the SMB, this is no longer the case.

Nowadays, like many other industries, cybercrime has largely become automated. So, once an attack is designed, there is no reason that a cybercriminal wouldn’t use it against a wide variety of businesses. It’s a little like using a bug zapper compared to the traditional flyswatter--you actually have to actively swing around the flyswatter, whereas a bug zapper allows you to set it up and let it do the work for you. Less effort, for equal (or really, improved) results.

Furthermore, a mobile device does tend to invite a greater risk of other kinds of cybercrime. Actual device theft is much easier when the device in question can be casually picked up and walked off with by a stranger, which is more likely to happen outside the office than within its walls. Convenience is a cybercriminal’s best friend.

What to Do About It

Therefore, you need to make sure that the mobile devices your employees are using throughout their day have the proper protections, and that (perhaps even more importantly) your employees are actually using them, and properly.

Here, we’ve put together a quick guide to help you get started with a more secure mobile strategy--and to hopefully make it more memorable, it follows the alphabet!

Mobile Security, as Simple as A-B-C-D-E


Okay, so one of the foundational concerns of the mobile security issue is that it is harder to ensure that only someone with permission to access data is actually going to be accessing it. Let’s face it, all it takes to potentially have a device stolen is for someone to leave their phone unattended in the coffee shop as they add more creamer. However, with the right authentication measures, the risk of the thief accessing data is greatly reduced.

Enforcing strong passwords and requiring two-factor authentication measures for your data helps to restrict access to your data to just the people who should have it. Therefore, this is the first step to any data protection process.


As we will get into, a big part of keeping the data accessible on mobile devices safe is the capability to delete it. As a result, it is important that you can then restore this data and continue using it once the issue has been resolved. Maintaining an up-to-date backup will ensure that you are able to do so.

Keep checking back on this blog to learn what makes a backup as reliable as can be, or give us a call to find out.


While yes, the mobile devices that your employees own are their property, you cannot allow them to use them as a part of a mobile device strategy if they are going to expose your business to security threats or vulnerabilities. The apps a user installs can contribute to both, so you need to make sure that certain applications are blocked by using a mobile device management solution and encouraging your staff to update their software frequently.


Unfortunately, mistakes will be made, and one of them may include one of your staff members actually losing their device. If a device turns up missing, you will want to have the means to wipe the device in question. Make sure that your mobile device management solution offers the capability to remotely wipe any company-owned data from the device in question. If the device is ultimately found somewhere, the data can be restored from the aforementioned backups.


Finally, to help your users avoid mobile security issues, you need to teach them a few key behaviors they will need to adopt. For instance, public Wi-Fi networks are notorious for harboring massive security threats that can access a device once it connects--especially as something is downloaded.

Encourage your users to use their mobile data instead, preferably with the added support of a virtual private network, or VPN. They also shouldn’t be downloading things casually, either.

While we may have covered a lot, the real key here is to promote responsible usage of one’s device… something that the use of a personally-owned device will generally encourage. To really secure a device, mobile device management solutions are perhaps your best option. For help implementing such protections, or with any other business technology question, give BNMC a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, July 09 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Network Security Email Microsoft Hackers Hosted Solutions Software Computer Business Malware Efficiency Google Communication Data Small Business IT Services Workplace Tips Mobile Devices IT Support Hardware Tech Term Cloud Computing Internet Managed IT Services Smartphone Data Recovery Mobile Device Innovation Android Backup Ransomware Outsourced IT Users Windows Smartphones Upgrade Information Saving Money Miscellaneous Facebook Phishing Data Backup Cybersecurity Business Continuity Browser Disaster Recovery Windows 10 VoIP Business Management Server Microsoft Office communications Social Media Network Productivity Office 365 Managed IT Services Windows 10 Passwords Internet of Things Data Management Gadgets Word Vulnerability Remote Monitoring Gmail App Quick Tips Encryption Infrastructure Chrome Mobile Office Apps Managed Service Managed Service Provider Artificial Intelligence Save Money Website Money IT Support Virtual Reality Information Technology Applications Tip of the week Government Router Settings BYOD Remote Workers Analytics Company Culture Networking Access Control VPN Employer-Employee Relationship Robot Hacker Data storage Development Office Tips Virtual Private Network Paperless Office Automation Spam HIPAA BDR WiFi Big Data Unified Threat Management Google Drive Avoiding Downtime Content Filtering Employee-Employer Relationship Bandwidth Computers Antivirus Maintenance Collaboration Firewall Apple Education Display Storage YouTube Risk Management IT Management Data Security Chromebook Server Management Training IT Business Technology Touchscreen Hard Disk Drive Social Network Managed IT End of Support Computing Laptop Tablet Outlook How To iOS The Internet of Things Bring Your Own Device Operating System LiFi Remote Computing Social Remote Work Mobile Security Hosted Solution Data loss Humor Conferencing Two-factor Authentication Best Practice Downtime Administration Telephone Systems SaaS desktop Mouse Compliance Business Intelligence Marketing Managed IT Service Wi-Fi Managed Services Customer Relationship Management Scam Virtualization Holiday Going Green Retail Alert Regulations OneNote Break Fix Data Breach Search Document Management Printing Augmented Reality Windows 7 MSP Software as a Service Solid State Drive Managing Stress Wireless Password Monitors Vendor Management Wearable Technology Network upgrade Messaging Running Cable Legislation Corporate Profile Nanotechnology Content Huawei Entertainment Vendor SharePoint G Suite Social Engineering Deep Learning Motherboard Cables Digital Signage Data Warehouse Buisness Automobile Microsoft Excel Mobile Device Management Policy Alerts USB Virtual Desktop Techology Dell Twitter Identity Continuity Monitoring Solid State Drives Sports Smart Technology Websites COVID-19 Fraud Cost Management Shortcuts Mobile Management Lenovo Cabling Smart Office Employee-Employer Relationships Statistics Alt Codes WannaCry Holidays Screen Reader Charging Streaming Processor Hybrid Cloud Downloads Safety Distribution Wires Troubleshooting Business Analysis Mail Merge Blockchain Google Maps Procedure Licensing Dongle VoIP Unified Threat Management Budget Solar Spying National Security Shortcut Distributed Denial of Service Assessment Security Cameras Profiles Firefox Superfish Network Congestion Work Analysis Students Bluetooth Comparison Typing Payment Card Smart Tech Human Error Memory Service Level Agreement Scalability Cybercrime Logistics Voice over Internet Protocol Virus Address Permissions Current Events PCI DSS Cooperation Utility Computing User Error Writing Updates Patch Management Digital Payment Hotspot Internet Exlporer Disaster IT Technicians Optimization Mixed Reality Specifications Cryptocurrency Digital Inventory Connectivity Device Reducing Cost Staff Leominster Migration Consulting Heating/Cooling Multi-Factor Security Google Docs Asset Management Modem FinTech LED Threats Dark Data IT solutions Update Laptops Time Management Printer PowerPoint Hacks Peripheral Language Value Uninterrupted Power Supply Google Wallet Mirgation Recycling Halloween Black Friday Bitcoin Spyware Politics Shadow IT IoT Mobility Batteries K-12 Schools Servers Google Calendar Computer Care Business Growth IBM Work/Life Balance Memes Cookies Co-Managed IT Emergency File Sharing Customer Service Managed Services Provider Network Management Office Samsung Legal Social Networking Onboarding GDPR Dark Web Health Private Cloud Management Computing Infrastructure Professional Services Unified Communications Drones Chatbots eWaste Slack Hard Disk Drives Scary Stories Cyber Monday Identity Theft Windows 8 Tech Support Gamification Star Wars Print Toner Myths Travel Law Enforcement Notifications Electronic Medical Records Supercomputer Physical Security CrashOverride Motion Sickness Emoji Staffing Upgrades Gadget Taxes Crowdsourcing Administrator Mobile Computing Web Server what was your? IT Budget Personal Information Botnet Cortana GPS 3D Printing Regulation IT Consultant Printers Cameras Processors Machine Learning Meetings Tracking Unsupported Software Cleaning CCTV Computer Repair Relocation Webcam Mobile Data How To Financial Recovery Error Point of Sale Ben McDonald shares Black Market

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3