The ABC(DE)s of Mobile Security

The ABC(DE)s of Mobile Security

As of September of 2019, research conducted by Verizon states that almost half of enterprises--half--are willing to sacrifice their mobile security in order to gain “advantages” in speed and productivity. This marks an increase from just 2018, when this metric measured at a still-too-high one-third of enterprises. Of course, such behaviors could bring severe consequences. 

That’s why we wanted to share how your business could exercise mobility, while still preserving security.

Why You Aren’t Safe as a Small/Medium-Sized Business

Once upon a time, cybercrime was a simple animal. A target was picked, and the method of breaching it was developed. This meant that the smart strategy for cybercriminals was to focus their efforts on larger targets, as breaching them would be more profitable for cybercriminals to take the time to do.

Unfortunately for the SMB, this is no longer the case.

Nowadays, like many other industries, cybercrime has largely become automated. So, once an attack is designed, there is no reason that a cybercriminal wouldn’t use it against a wide variety of businesses. It’s a little like using a bug zapper compared to the traditional flyswatter--you actually have to actively swing around the flyswatter, whereas a bug zapper allows you to set it up and let it do the work for you. Less effort, for equal (or really, improved) results.

Furthermore, a mobile device does tend to invite a greater risk of other kinds of cybercrime. Actual device theft is much easier when the device in question can be casually picked up and walked off with by a stranger, which is more likely to happen outside the office than within its walls. Convenience is a cybercriminal’s best friend.

What to Do About It

Therefore, you need to make sure that the mobile devices your employees are using throughout their day have the proper protections, and that (perhaps even more importantly) your employees are actually using them, and properly.

Here, we’ve put together a quick guide to help you get started with a more secure mobile strategy--and to hopefully make it more memorable, it follows the alphabet!

Mobile Security, as Simple as A-B-C-D-E


Okay, so one of the foundational concerns of the mobile security issue is that it is harder to ensure that only someone with permission to access data is actually going to be accessing it. Let’s face it, all it takes to potentially have a device stolen is for someone to leave their phone unattended in the coffee shop as they add more creamer. However, with the right authentication measures, the risk of the thief accessing data is greatly reduced.

Enforcing strong passwords and requiring two-factor authentication measures for your data helps to restrict access to your data to just the people who should have it. Therefore, this is the first step to any data protection process.


As we will get into, a big part of keeping the data accessible on mobile devices safe is the capability to delete it. As a result, it is important that you can then restore this data and continue using it once the issue has been resolved. Maintaining an up-to-date backup will ensure that you are able to do so.

Keep checking back on this blog to learn what makes a backup as reliable as can be, or give us a call to find out.


While yes, the mobile devices that your employees own are their property, you cannot allow them to use them as a part of a mobile device strategy if they are going to expose your business to security threats or vulnerabilities. The apps a user installs can contribute to both, so you need to make sure that certain applications are blocked by using a mobile device management solution and encouraging your staff to update their software frequently.


Unfortunately, mistakes will be made, and one of them may include one of your staff members actually losing their device. If a device turns up missing, you will want to have the means to wipe the device in question. Make sure that your mobile device management solution offers the capability to remotely wipe any company-owned data from the device in question. If the device is ultimately found somewhere, the data can be restored from the aforementioned backups.


Finally, to help your users avoid mobile security issues, you need to teach them a few key behaviors they will need to adopt. For instance, public Wi-Fi networks are notorious for harboring massive security threats that can access a device once it connects--especially as something is downloaded.

Encourage your users to use their mobile data instead, preferably with the added support of a virtual private network, or VPN. They also shouldn’t be downloading things casually, either.

While we may have covered a lot, the real key here is to promote responsible usage of one’s device… something that the use of a personally-owned device will generally encourage. To really secure a device, mobile device management solutions are perhaps your best option. For help implementing such protections, or with any other business technology question, give BNMC a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 28 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Productivity Cloud User Tips Email Microsoft Software Hackers Computer Network Security Hosted Solutions Malware Google Data Business Mobile Devices Efficiency Communication Small Business IT Services Tech Term Hardware IT Support Internet Workplace Tips Managed IT Services Ransomware Innovation Cloud Computing Smartphone Data Recovery Upgrade Smartphones Outsourced IT Backup Mobile Device Android Saving Money Information Miscellaneous Windows Windows 10 Facebook Users Data Backup Cybersecurity Business Continuity Managed IT Services Microsoft Office Business Management Server Phishing Browser Office 365 Social Media Data Management Windows 10 Passwords communications Internet of Things Network VoIP Productivity Gmail Gadgets Word Vulnerability Remote Monitoring App Managed Service Disaster Recovery Encryption Apps Quick Tips Infrastructure Chrome Artificial Intelligence Website VPN Access Control BYOD Analytics Settings Managed Service Provider Save Money Tip of the week IT Support Money Virtual Reality Applications Router Employer-Employee Relationship Employee-Employer Relationship Government Office Tips Computers Paperless Office IT Management Data Security Google Drive Bandwidth Company Culture Content Filtering Virtual Private Network Big Data Display Unified Threat Management Education Apple Storage Development Robot Maintenance Collaboration Firewall Hacker Data storage Automation Avoiding Downtime Antivirus YouTube Networking Risk Management Social Business Intelligence LiFi SaaS Humor Hard Disk Drive Hosted Solution Information Technology Wi-Fi Virtualization Administration Holiday OneNote Business Technology Remote Workers Mouse Server Management Laptop Data Breach Retail Alert Touchscreen The Internet of Things IT Managed IT Augmented Reality Social Network MSP Windows 7 Managing Stress Data loss Software as a Service Tablet Downtime Telephone Systems Marketing Monitors desktop Printing Vendor Management Chromebook Password Two-factor Authentication Managed IT Service HIPAA End of Support Customer Relationship Management Scam BDR Document Management Mobile Security Outlook Break Fix Solid State Drive Spam Computing Wireless WiFi Bring Your Own Device Operating System Search Updates Emergency Compliance Training Corporate Profile Managed Services Utility Computing Budget Servers Running Cable Google Calendar Shadow IT Hotspot Internet Exlporer Mixed Reality Typing Buisness Dark Web Writing IT Technicians Optimization G Suite Device Reducing Cost Network Management Memes Connectivity Automobile Cyber Monday Staff Leominster Dell LED Threats Current Events Virtual Desktop Modem FinTech Migration Best Practice Consulting Sports Update Value Cabling PowerPoint Regulations WannaCry Laptops Legislation Dark Data Language Cryptocurrency Microsoft Excel Mirgation Recycling Mobility Batteries SharePoint IoT Google Maps Smart Technology K-12 Schools Co-Managed IT IT solutions Going Green Techology Cookies Politics Google Docs Customer Service Computing Infrastructure Professional Services Onboarding GDPR Hacks How To Lenovo Social Networking Managed Services Provider Statistics Slack Hard Disk Drives Bitcoin Mail Merge Blockchain Office Chatbots Samsung eWaste Print Toner Myths Google Wallet Cybercrime Downloads Holidays Star Wars Private Cloud Business Growth Shortcut Distributed Denial of Service Wearable Technology Network upgrade Content Huawei VoIP Unified Threat Management Distribution Nanotechnology Tech Support Digital Payment Messaging Alerts USB Disaster Digital Signage Data Warehouse Firefox Superfish Motherboard Cables Digital Entertainment Vendor Legal Bluetooth Comparison Monitoring Solid State Drives Windows 8 Address Permissions Social Engineering Identity Continuity Shortcuts Unified Communications Mobile Management Drones Payment Card Fraud Cost Management Employee-Employer Relationships Patch Management Smart Office Streaming Processor User Error Logistics Screen Reader Websites Charging Licensing Dongle Uninterrupted Power Supply Troubleshooting Business Analysis Mobile Device Management Wires Spyware iOS Deep Learning Hybrid Cloud Halloween Specifications Spying National Security Safety Solar Computer Care IBM Security Cameras Profiles Heating/Cooling Multi-Factor Security Inventory Assessment File Sharing Analysis Students Alt Codes Remote Computing Work Human Error Memory Time Management Printer Asset Management Smart Tech Network Congestion Cooperation Service Level Agreement Virus Voice over Internet Protocol Identity Theft Scalability Conferencing Scary Stories Black Friday Travel Processors Machine Learning Unsupported Software Supercomputer CrashOverride Motion Sickness Staffing Taxes Computer Repair Administrator Relocation Web Server what was your? Financial Mobile Data IT Budget Recovery How To Work/Life Balance GPS IT Consultant Health Black Market Cameras Meetings Law Enforcement Tracking Notifications Cleaning Electronic Medical Records Twitter CCTV Physical Security Emoji Webcam Upgrades Gadget Crowdsourcing Personal Information Error Botnet Regulation Cortana Point of Sale Ben McDonald shares Printers Mobile Computing 3D Printing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3