FCC Smartphone Security Checker

With over 120 million Americans owning smartphones and mobile security threats increasing 367% in the past year, the FCC released a smartphone security checker for consumers.

The checklist can be customized for Android, iPhone, Blackberry and Windows devices. It offers tips for consumers that are as simple as adding a password to wiping your data before you donate an old phone.

KoolSpan’s Mobile Security Checklist for Enterprise

The FCC Smartphone Checker offers simple tips that will help consumers understand steps that they should take to protect their personal information.

For enterprise mobility solutions though, this checklist is not enough. While the FCC didn’t intend for this checklist to be used to secure company-owned smartphones, federal government and large enterprises have more sensitive information than the ‘average Joe.’

  • Develop a clear security policy: Having clear guidelines helps to establish the appropriate controls that make sense for your organization. Without a policy in place, employees may not know that they should use a password to access their devices. If you already have a security policy that clearly identifies computers and laptops, double-check that it also addresses smartphones and newer devices such as tablets.
  • Educate your employees about your policy and best practices: Even if you create a thorough security policy, you can’t expect your employees to follow it unless you educate them on the policy and why it’s so important to your company. Don’t forget to train new employees on your policy when they start as well.
  • Upgrade to military level encryption. More and more phones today offer their own basic level of security, such as the Windows phone and iPhone. For sensitive commercial and government information this basic security is not strong enough. If your employees deal with confidential information, travel overseas often or are required to maintain the FIPS 140-2 standard, you need to protect your devices with a higher level of security that protects against mobile security threats on the home device and against network connections end-to-end.
  • Enable remote wipe. In case an employee loses their laptop, tablet or smartphone, remote wipe provides a way to keep your information secure. If the device is lost or stolen, wiping all of the data will keep it out of the wrong hands. Without remote wipe, your information is out there for anyone who comes across the device. Password protection can help mitigate this risk, but passwords are often easy to crack.
  • Authenticate users. Your company may not need the highest level of security for all employees, but for executives with access to the most sensitive company information, providing them with mutually authenticated communication protects classified information and ensures it stays within an established set of users. Authentication protects communication between these executives so that if malware enters your network through a less secure connection, the most classified information remains protected.

To learn what other enterprise mobility solutions you can take to toughen your security, visit KoolSpan at www.koolspan.com or contact us at (240) 880-4400.

Verified by MonsterInsights