fbpx

Your IT Support Experts

We partner with many types of businesses, and strive to eliminate IT issues before they cause expensive downtime.

Home

Stores

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

JensenIT Blog

Keeping Your Smartphone Safe Helps Everyone

Keeping Your Smartphone Safe Helps Everyone

Mobile devices accompany us more or less everywhere, leading us to use them more and more frequently in all aspects of lie, including for business purposes. As a result, cybercriminals have even more motivation to target them. To help you avoid a mobile device being the downfall of your company’s security, we’ve assembled a few practices you and your staff should adopt.

Keep It with You

Hopefully, you aren’t naturally inclined to leave a thousand-dollar gadget lying around willy-nilly, but it doesn’t hurt to bring up the possibility anyways. Your phone should never be left unattended out in public, as any data that the device has access to is put at risk. This includes your own data, as well as company documents if the device was used to access them via a Bring Your Own Device arrangement. While BYOD policies typically include remote wiping measures, who knows what data may have been viewed before the wipe was initiated?

Be Selective Concerning Wireless Networks

Under the right conditions, Wi-Fi and Bluetooth are great, allowing a user to connect to the Internet and other devices that boost their phone’s utility. Unfortunately, these connections can be a wolf in sheep’s clothing - unsecured networks can easily subject your device (and the data it contains) to any number of threats. A good way to minimize the chances of this happening are to avoid making connections to unknown networks, using your data plan if you have to.

Protect Your Sensitive Credentials

As people use their phones for almost everything these days, most of these devices now allow a user to store passwords, PIN numbers, and payment card information on the phone itself for simplified access. The thing is, if your phone was to fall into the wrong hands, this means that the person who now has the device is given that simplified access. While the best move is to simply choose not to store these details in your phone, there are secure applications that are much better to use if you do. For help in selecting one, reach out to us.

Clean Out the Data You’ve Generated

There’s a lot of data that your phone retains, from the words (including personal data) that its autocomplete records, to the web browsing app’s history. All of this data and more is very valuable to a cybercriminal, so as a precautionary measure it is good to clear out this data every so often.

To keep your data safe, you need to protect it from all of the potential ways it can be breached. JensenIT has the tools and experience to help. Reach out to us at (847) 803-0044 to learn more.

Understanding the Different Types of Cloud
Blockchain Leads 2019’s Business Technology Trends
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, October 24, 2019

Captcha Image

Customer Login

Latest Blog

If you’ve spent any time using a computer, you probably know what a URL is. It is the address of a website. It typically starts with “http//:” or “https://” and directs the Internet browser on where the user would like to surf. Nowadays a threat could be created by manipulating the URL. Today, we’ll take you through this threat. 

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!