Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Create a Comprehensive Mobile Policy

Mobile Security

Network security is a major point of emphasis for most businesses that rely on their IT. As a result, mobile security should work in concert with your network security rules. Here are a couple of guidelines you will want to include to ensure that your mobile platform stays secure:

  • All devices must be password-protected in accordance with your company’s password policies and guidelines, and set to lock if left idle for a given amount of time.
  • Any devices not included in the acceptable list, or that are not a part of a BYOD policy (i.e., are exclusively for personal use) may not connect to the network.
  • Any device may be wiped if it is misplaced, if the owner leaves the company, or a potential threat is detected by IT.

This is not a comprehensive list. You will want to add other security-minded protocols as you see fit.

Protect Your Business

Your business probably has spent a fair amount of time and money investing in efforts to keep your data and infrastructure safe. Why would you suddenly let employee mobile devices present problems for your business? You will want to make sure that you are protected. A few variables to add to your mobile policy include:

  • Any lost or stolen devices need to be reported to IT within 24 hours, with the mobile carrier notified immediately.
  • By using their mobile device, an employee consents to the company’s acceptable use policy and adheres to it.
  • Any mobile device is subject to being disconnected from the network or having its services disabled without notice.
  • Should a device need to be remotely wiped to protect company data, IT will make every effort to protect the user’s data from being lost. However, the company’s security will come first, which means that users need to take their own backups.

Just like all the other rules and regulations you have documented, putting both your mobile device policy and your Bring Your Own Device (BYOD) policy in writing is a solid practice

What is Acceptable

Your mobile policy has to outline how your staff can use their devices at work. At Coleman Technologies, we believe erring on the side of security is prudent, but some organizations open theirs up a little more than we’d like. Some line-items you should include are:

  • Clear definitions of acceptable business use and acceptable personal use on company time, as well as what actions are forbidden at any time (such as storing illicit materials or harassing others).
  • A list of the business resources that employees can access via their mobile devices.
  • Approved and disapproved applications - including those acquired outside of Google Play or iTunes.
  • Which websites cannot be accessed through the corporate network.

There is much more to managing your staff’s mobile devices than simply posting rules. To talk to one of our technicians about the technology that can help you manage your company’s mobile device policy, call us today at (604) 513-9428.

×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

Cybersecurity Needs to Shift for Businesses to Sur...
Tip of the Week: Specifying Your Google Queries
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Thursday, 21 November 2024

Captcha Image

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image