Skip to the main content.

If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen.

<img src="https://blogfeed.ulistic-projects.com/wp-content/uploads/2014/07/83065611.jpg" align="right" alt="Mobile Security" width="200"When your smartphone is synched to your firms cloud data, there might be more than personal information at risk. The good news is, setting your device security do not have to be difficult. The process is fairly simple and straightforward, given that your systems use up-to-date technology.

Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data.

Here are possible minimum requirements every firm system must have:

  • PIN required to access phone- a 4-digit minimum must be required, but the longer the PIN, the more secure it will be.
  • PIN timeout- It’s important to have a maximum idle time a PIN is allowed to be used. This is to ensure that the device is not left unattended, or in the case that it is, unwated onlookers might not be able to access the firm’s information. Allowable can be 0-60 minutes. 0 means a PIN must be entered every time a phone is turned on.
  • Failed login attempts before wipe: Maximum attempts to enter PIN must also be implemented. This can go from 4 to 16 attempts. This means that after 16 failed attempts to enter the correct PIN, the phone will automatically be wiped of data and reset to factory default settings.
  • Encryption- Enable encryption on storage card if the option is available.
  • If you do not have these steps employed yet, here are some recommendations to consider for maximum information security:

    1. First, you must inform the employees of the importance and urgency of the changes you’re going to implement. You can have everyone sign a mobile device security policy ensure that the protocols are observed.
    2. Have the phones and devices updated to meet the necessary requirements of update. For encryption, all iPhones running on iOS7 and up are encrypted by default. Android phones have no problem with encryption settings.
    3. When you have secured that the phones meet the minimum requirements, it’s time to move to updating the Exchange Server. Individual difference in PIN and PIN timeout cause varying security level, but the Exchange Server will impose a fixed minimum security setting that employees cannot alter.

    There are also available third-party options like Good Technology and MaaS360. They can be used for separating firm and personal data. This comes especially helpful to those who have a BYOD (Bring Your Own Device) policy. However, this can also pose as a challenge as it requires the use of “firm apps” to access emails, contacts, and calendars that do not work as seamlessly as native applications.

    Thinking about a BYOD policy in your {city} business? We can help.  {company} works with my businesses across {city} to help ensure their mobile computing is very secure. Have questions?  Give us a call at {phone} or email us at {email}.

    Build a Reliable Reputation in Your Law Firm by Outsourcing Your IT Services.

    Build a Reliable Reputation in Your Law Firm by Outsourcing Your IT Services.

    If you run your own law firm, you understand that it isn’t easy dividing your energy into two sectors which include; focusing on keeping your law...

    Read More
    Do You Want to Speed Up Your Computer?

    Do You Want to Speed Up Your Computer?

    Do You Want to Speed Up Your Computer? Here are Top Tips A slow computer can undermine productivity and become a source of frustration. Fortunately,...

    Read More
    Think Before You Swipe: 3 Shocking Places You Never Realized Were Dangerous for Using YOUR Debit Card!

    Think Before You Swipe: 3 Shocking Places You Never Realized Were Dangerous for Using YOUR Debit Card!

    Would you feel comfortable handing a thief access to your checking account? No? We don’t blame you. As data breaches continue to rise, there’s a lot...

    Read More