New release : CTI Report - Pharmaceutical and drug manufacturing 

                 Download now

Using mobile phones in a professional context: risks & best practices

Using mobile phones in a professional context: risks & best practices

[et_pb_section fb_built="1" _builder_version="4.4.2"][et_pb_row _builder_version="4.4.2"][et_pb_column type="4_4" _builder_version="4.4.2"][et_pb_image src="https://www.intrinsec.com/wp-content/uploads/2020/04/risks_mobile_entreprise.png" align="center" _builder_version="4.4.2" width="65%"][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version="4.4.2"][et_pb_column type="4_4" _builder_version="4.4.2"][et_pb_text _builder_version="4.4.2" text_font="Nunito Sans|||||||||" text_font_size="16px" header_font="Poppins||||||||" header_2_font="Poppins|500|||||||" header_2_text_color="#e02b20" header_2_line_height="1.2em" custom_margin="||-33px|||"]

 

Mobile devices can be a prime entry point for malicious actors.

Therefore, it is necessary to take effective preventative and protective measures to to protect oneself against the associated risks, such as:

  • Unsecured data storage
  • The disruption to communications
  • Data leaks: theft & malicious dissemination

These risks can affect your fleet of company mobile phones, but it is also common for employees to use their personal phones to handle work-related matters (Bring Your Own Device – BYODDiscover Our best practices and recommendations to secure your data and protect your business on mobile environments (Apple & Android), whether professional or personal.

 

Professional mobile fleet: best practices & safety recommendations.

To ensure the confidentiality of company data, it is possible to add the following restrictions, notably blocking the downloading of these files from the Cloud.

  • Block screenshots
  • Block the backup of company data to the Cloud
  • Block the use of the Cloud to store documents

Indeed, in the event that the user's account is compromised, data confidentiality is no longer guaranteed.

Furthermore, if you have a Mobile Device Management (MDM) solution, Regular compliance checks are necessary to ensure integrity (In terms of device security). If the check returns a negative result, it is then essential to have a quick response (via a notification or data deletion) to protect the information.

It is also important to have the right to perform at least an Enterprise Wipe (removes all company data as well as the MDM (Mobile Device Management) configuration without deleting user data) or a Device Wipe (completely resets the device).

Finally, we recommend that you to carry out a mobile penetration test to assess and improve the security of your mobile devices and your business applications on mobile. If you have Mobile Device Management, we also suggest you implement an MDM configuration audit.

 

 

[/et_pb_text][et_pb_button button_url="https://www.intrinsec.com/evaluer-sa-securite-informatique/" url_new_window="on" button_text="Learn more about our audits & intrusion tests" button_alignment="center" _builder_version="4.4.2"][/et_pb_button][et_pb_text _builder_version="4.4.2" text_font="Nunito Sans||||||||" text_font_size="16px" header_font="Poppins||||||||" header_2_font="Poppins|500|||||||" header_2_text_color="#e02b20" header_2_line_height="1.2em" custom_margin="||-33px|||"]

 

«Bring Your Own Device» – Using personal phones to access work information: our tips to raise awareness among your teams and maximize data security.

 

On your personal phones, we recommend applying the same level of security as on your work devices, namely:

  • Prefer using a privacy filter also on mobile devices (they are often used on public transport).
  • Disabling notifications on the lock screen (and in the best-case scenario, disable the preview when the phone is unlocked).
  • Enable remote device erasure.
  • Enable brute-force protection for the lock code to erase the phone after x attempts.
  • Enable biometric protection on business applications (child / spouse / friend who borrows your phone).
  • Enable data encryption on the devices.
  • Preferably activate biometric unlocking (this reduces code disclosure by "look over the shoulder").

In addition, we strongly encourage you to implement measures to raise awareness among your employees regarding the security of professional data:

  • Give them the right advice to fight phishing Even on mobile, the risks associated with phishing are numerous, and it's essential to protect yourself. You can find our best practices here. here.
  • Use encrypted messaging solutions like Signal.
  • Do not store professional documents in the cloud or the phone's memory.
  • We strongly advise against integrating work emails and Active Directory credentials. on personal mobile phones.
  • Block access to the company Wi-Fi network on personal phones If the phone is at risk, you will prevent the spread of the virus to your internal information system. Therefore, it is best to Make it a habit not to connect to public Wi-Fi networks, which are generally insecure. or at a minimum, have a secure connection through this access point (using a VPN).

 Finally, we strongly advise you to to implement a strategy of cybersecurity awareness : Engage a cybersecurity specialist to raise awareness among your employees about cyber risks and train them in best practices.

 

[/et_pb_text][et_pb_button button_url="https://www.intrinsec.com/awareness/" url_new_window="on" button_text="Learn more about awareness" button_alignment="center" _builder_version="4.4.2" custom_button="on" button_bg_color="#59c9a5" button_border_color="#59c9a5"][/et_pb_button][et_pb_text _builder_version="4.4.2" text_font="Nunito Sans||||||||" text_font_size="16px" header_font="Poppins||||||||" header_2_font="Poppins|500|||||||" header_2_text_color="#e02b20" header_2_line_height="1.2em" custom_margin="||-33px|||"]

 

In general, we recommend that you encourage your employees to use their phones as little as possible staff to deal with professional matters.

Whether your company is a BYOD enthusiast or has a fleet of professional mobile devices, You can also deploy an EDR-type antivirus solution on your mobile devices. particularly through your Mobile Device Management system. Our partners offer solutions in this regard:

 

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built= »1″ _builder_version= »3.22.4″ use_background_color_gradient= »on » background_color_gradient_start= »#c9202b » background_color_gradient_end= »rgba(204,42,45,0.56) »][et_pb_row column_structure= »3_4,1_4″ _builder_version= »3.25″][et_pb_column type= »3_4″ _builder_version= »3.25″ custom_padding= »||| » custom_padding__hover= »||| »][et_pb_text _builder_version= »3.27.4″ text_font= »Nunito Sans|||||||| » text_text_color= »#ffffff » text_font_size= »24px » text_line_height= »1.4em » header_font= »|||||||| » custom_margin= »-11px|||31px » custom_padding= »13px|| »]

For an effective and tailored response to your challenges, do not hesitate to contact us. 

[/et_pb_text][/et_pb_column][et_pb_column type= »1_4″ _builder_version= »3.25″ custom_padding= »||| » custom_padding__hover= »||| »][et_pb_button button_url= »https://www.intrinsec.com/contact » url_new_window= »on » button_text= »Contactez-nous » button_alignment= »left » _builder_version= »3.22.4″ custom_button= »on » button_text_size= »18px » button_text_color= »#e02b20″ button_bg_color= »#ffffff » button_border_color= »#ffffff » button_font= »Nunito Sans|700||||||| » button_icon= »%%86%% » button_icon_color= »#ffffff » button_icon_placement= »left » custom_margin= »17px|-30px||17px|| »][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section]