Connect with us

Hi, what are you looking for?

HEADLINES

How small companies can secure mobile devices on a budget

Small businesses can still use mobile technology – including employee-owned devices – without a huge investment of time or money.

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device adoption as large enterprises. However, most VSBs lack the security awareness, technical expertise, and budget needed to properly protect company-issued or employee-owned (BYOD) mobile devices.

A Kaspersky Lab survey asked 3,900 IT professionals worldwide about IT challenges they encountered over the previous 12 months, and 34% of VSBs said they had managed the integration of mobile devices into their business.

What’s noteworthy is this rate is nearly identical to the rate of mobile integration reported by enterprises, which was 35%. This means the smallest companies in the world are adopting mobile technology at essentially the same rate as huge companies with more than 5,000 employees.

In fact, VSBs actually reported a higher rate of mobile adoption than small businesses with 26-99 employees, as well as large businesses with 1,500-5,000 employees. VSBs reported 6% more mobile integration than small businesses (defined as 26-99 employees), and 2% more than large businesses (defined as 1,500-5,000 employees).

These statistics certainly cast doubt on any perceptions that VSBs are confined to antiquated technology or slow to invest in IT.

Advertisement. Scroll to continue reading.

Mobile technology may not be restricted to businesses based on their size, but there are other key factors to consider. Expertise and resources are the most obvious limitations of VSBs, which frequently don’t have dedicated IT staff to manage technology implementations.

These limitations may lead to a knowledge gap even amongst security-minded business owners. For example, 31% of VSBs listed “Securing Mobile/Portable Computing Devices” as one of their top-three IT security priorities for the next 12 months (a rate comparable to the 34% adoption rate from the previous 12 months).

But when asked about BYOD (Bring Your Own Device) policies, where employees use their own mobile devices for business purposes, the survey uncovered a perception-gap based on company size.

When surveying attitudes towards technology trends, 28% of VSBs agreed that BYOD introduces an increased IT security risk to their business.

But large businesses and enterprises had a response rate that was nearly twice the VSB response, with 52% and 48% respectively agreeing about the risks presented by BYOD.

Advertisement. Scroll to continue reading.

Is it possible that VSBs are overlooking employee-owned mobile devices as a security risk?

This seems like a particularly troubling possibility, given that VSBs and their limited budgets are most likely to view employee-owned devices as a cost-savings measure and gladly welcome these devices onto their networks.

Common threats from employee-owned mobile devices include malware or rouge applications connecting to the company’s network via the employee’s device, or company data disappearing along with a lost or stolen employee device.

Steps for Mobile Security on a Budget

Realizing that most VSBs lack the budget and technical sophistication for advanced mobile security solutions, small businesses can still use mobile technology – including employee-owned devices – without a huge investment of time or money.

Advertisement. Scroll to continue reading.

A mixture of common-sense and the right technology can go a long way to securing mobile devices, and help the owners of a startup get back to running their business.

1) Employee Education: the first lines of protecting your business data are employees with security mindsets.

Make sure new employees know that if their smartphones or tablets contain workplace information, that device shouldn’t be subjected to unnecessarily risky usage habits (e.g., browsing questionable websites), and if the device is lost or stolen, it should be reported immediately to the employer, not days later.

2) Basic Anti-Theft: an inexpensive piece of software that can remotely-wipe the data from missing or stolen devices is essential.

Some devices offer similar functions built-in, and there are many third-party applications that can accomplish this task. But make sure an employee understands that if their device is wiped, that typically means any personal information on the device is deleted as well.

Advertisement. Scroll to continue reading.

3) Avoid Complexity: a newly-created startup business with five employees can’t spend hours purchasing, deploying, and managing a business-grade security product that wasn’t built for their purposes.

Avoid purchasing a larger product than the business needs, and stick to core mobile security features.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. 

HEADLINES

Sophos Counter Threat Unit revealed the NICKEL TAPESTRY threat group’s scheme involving fraudulent workers operating on behalf of North Korea (formally known as the...

HEADLINES

PRSP is a staunch advocate of communication based on honesty and integrity. While our role is to uphold and strengthen the reputation of our...

HEADLINES

Poor password management is compounded by a reliance on common combinations of names, dictionary words and numerals. Not only are these passwords relatively easy...

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

HEADLINES

Amplifying this risk is the increasing use of artificial intelligence (AI), which introduces new levels of realism and precision that demand heightened vigilance, especially...

HEADLINES

#BeCyberSmart is the PLDT Group’s umbrella campaign for cybersecurity awareness aimed at promoting vigilance against scams, digital hygiene and responsible online behavior, especially among...

HEADLINES

According to a new report from Kaspersky GReAT (Global Research and Analysis Team), the attackers targeted at least six organizations across the software, IT,...

Advertisement