dcsimg

Be Smart with Smartphone Security Policies and Practice

With all the fuss this week about the release of Google's new smartphone, this is a good time to remember that smartphones operate more like a computer than a phone and they need the same care as the desktop in your office.


What makes smartphones work so well as a portable office is the capability to browse the Internet. That capability also means your employees are at risk for viruses and other security breaches, so IT staff need to be just as vigilant with company-issued phones accessing the network as they are with computers.


This can be done with specific policies on smartphone use, such as the one Abilene Christian University uses.

 

To help come up with solid guidelines, consider the Guidelines for Cell Phone and PDA Security from the National Institute of Standards and Technology.


Since many people like to take advantage of free Wi-Fi or use a Bluetooth device with their smartphones, companies may want to consider guidelines regarding their use. For example, a CNN article on smartphone security offers this piece of advice on Bluetooth:


"Pairing a mobile phone with another Bluetooth-enabled device, like a headset, means any device that can "discover" another Bluetooth device can send unsolicited messages or do things that could lead to extra fees, data being compromised or corrupted, data stolen in an attack called bluesnarfing,' or the device being infected with a virus. In general, disable Wi-Fi and Bluetooth unless you absolutely need to use them."

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
By using this site, you agree to the Privacy Policy