Some BYOD Tips to Protect Against Hackers

Paul Mah

Tech expert Karl Volkman of Chicago's SRV Network, Inc. recently sent over some tips on how to keep your data safe while traveling. I highlight a number of points that I feel are especially pertinent to the employees of small and mid-sized businesses who may be on the road often, and weigh in with some opinions of my own.

Use VPN when on public Wi-Fi

"Avoid doing professional business on public Wi-Fi, but if required, use a VPN or terminal server technologies," writes Volkman. I heartily agree with this advice, though I would point out that smaller businesses are unlikely to have terminal server technologies deployed. This leaves the use of a VPN appliance or server as the easiest method for SMBs to protect their privacy.

What many people may not be aware is that setting up a fake Wi-Fi network is as simple as configuring a Wi-Fi access point with the same SSID. However, the use of a VPN that has been correctly configured to make use of digital certificates will foil this very real attack vector.

Ensure firewall and antivirus are working

In addition, Volkman also suggests that mobile workers check that their firewall and antivirus software are working properly. While this may sound extraneous, it is relatively easy for firewall and anti-virus defenses to be left disabled by mistake.

And in the case of an anti-malware scanner, it makes sense to also ensure that the latest virus definition files are downloaded and installed. Finally, the latest patches for your operating system and application software should always be applied in a timely manner.

Encrypt your storage drives

I added this myself. Workers who frequently do their work outside the office run the highest risk of suffering data leakage, either due to carelessness or theft. As you can imagine, the only way to defend against this possibility is to encrypt all relevant storage devices. This can be easily achieved by enabling BitLocker for businesses using the Enterprise edition of the Windows operating system, or using a free disk encryption software like TrueCrypt.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Add Comment      Leave a comment on this blog post
Feb 24, 2013 6:01 AM Mrpthai Mrpthai  says:
Thank admin for protect hackers. Reply
Mar 15, 2013 4:49 AM Firewall Security Firewall Security  says:
Hey, nice post! I am also going to say some point regarding the “Firewall of a T1 Router “ are designs to restrict unauthorized access to a local network. This is only for keep out malicious attackers, safeguard legitimate network traffic .T1 firewall routers is not automatically configure firewall that comes in consumer-grade products. Advantage Combining of T1 interface and a built in firewall, T1 firewall is ideal for solution and securing a network. They conserve space Make the most of administrative time Improve the reliability of the network and save cost all at once Reply

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.