Don’t forget your phone when you think about cyber security • Blisstech Solutions

Our phones are a goldmine of private information. Just think of all the financial details, personal messages, banking apps, photos and contact information that live behind that little glass screen.

And if your team use phones for work, they’ll often have access straight into company systems – email, contact lists, network access, file systems. So if they’re not kept as secure as any other device in your workplace, they can become a gaping hole in your cyber security.

Criminals know this, of course, which is why they target us through our phones just as much as they do through our networks and servers.

But cybercrime isn’t the only concern. Just losing your phone, or having it stolen, can put your data at huge risk.

So, whether you issue company smartphones or your employees use their own, you should make sure everyone implements some simple security steps to protect your data and avoid disaster.

Start with making sure your people set up a PIN and a biometric login (like a fingerprint or face scan) to open the device.

Only install apps from trusted sources to make sure you’re using genuine software.

And enable Multi-Factor Authentication on all apps that store even a small amount of sensitive data.

Be careful about where you connect to Wi-Fi. If you work remotely or often connect to public networks, consider using a VPN – a Virtual Private Network – to add another layer of security. You never know who’s monitoring traffic on a public network.

Finally, consider using a Mobile Device Management (MDM) solution that can control all of the above.  There is a great one called Microsoft Intune that is built into some versions of Microsoft 365.

Smartphones have changed so much about the way we live – at home, and at work – but it’s too easy to take them for granted. And that could be a costly mistake.

If you need help keeping your smartphones safe, just get in touch.

More Content

Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you might think…

Video thumbnail

Tech Tip: Quickly add lines numbers and bullets in Word

Happy Tuesday everyone! Today's Tech Tip is a tip on how to use some of the formatting shortcuts in Word to add lines, bullets and numbers to organise your documents. If you use Word to write your documents, and 90% of people do, you will love this tip as it will show...
How to use Browser Profiles thumbnail

Tech Tip: How to use browser profiles

This Tech Tip is on how to use web browser profiles. If you are a freelancer, virtual assistant, or just wear many hats in your job role, you probably have multiple different logins for the same application. As so many applications are web-based, we have to login to...
Uh oh! You’re at greater risk of malware than ever before

Uh oh! You’re at greater risk of malware than ever before

Small and medium-sized businesses are at more risk of a malware attack than ever. It’s time to take action to protect your business. Here we tell you how.

Windows 11 optional update: Why it’s better to wait  

Microsoft has just announced an option for people to trial new features before their general release in Windows 11.  This isn’t about fixes to security flaws – everyone gets those at the same time.   This is an opportunity for businesses to jump the queue to receive new features and updates first.  Sound exciting?   Yes!   Worth the risk?   Not quite.  Our …
Read More

Learn how to talk tech with our Jargon Buster

Do you find IT terminology difficult to comprehend? To ensure effective communication with our clients, we strive to avoid using technical jargon. However, having a basic understanding of some IT terminologies may prove advantageous in seeking IT assistance in the...

Are your people Christmas shopping from work?

Almost half of people with social media accounts admit to falling for shopping scams. If your team are shopping at work, is your business protected?

Are you ready for next-gen email security? (YES!)

Are you ready for next-gen email security? (YES!)

Sick of spam emails? We have details of a cool new tool to help keep us better protected.

How to use Format Painter thumbnail

Tech Tip: How to use Format Painter in Office 365

Welcome to a new Tuesday tech tip video where we will show you how to use a feature of Office applications called Format Painter. If you want to know how to quickly make the content of your Office documents look consistent, then this video will show you how. Format...
Child working at a laptop

Donated Laptops for Lockdown Learning

A Digital Divide It is a shocking fact that 9% of children in the UK, between 1.1 and 1.8 million, do not have a computer, laptop or mobile device in their home, according to research carried out by Ofcom. This pandemic is shining a stark light on the gap in provision...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05