{"id":4044,"date":"2019-06-01T17:21:33","date_gmt":"2019-06-01T17:21:33","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/?p=4044"},"modified":"2019-07-24T20:34:28","modified_gmt":"2019-07-24T20:34:28","slug":"10-ways-to-stay-secure-on-the-go","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2019\/06\/01\/10-ways-to-stay-secure-on-the-go\/","title":{"rendered":"10 ways to stay secure on the go"},"content":{"rendered":"
<\/p>\n
Welcome to\u00a0Day 6 of Business Self-Defense\u00a0<\/strong>from Microsoft Canada. In this post about security on the go, we talk about how small and medium-sized businesses with employees who work in the field can defend themselves from hackers and other threats.<\/p>\n Mobile devices have changed not only the way we interact with our family and friends, but the way we work, and even the way we pay for things. These days you can do everything from one device, even simultaneously if your heart so desires. And while staying current with technological advancements makes sense for every business, it also opens your organization up to extra risks that you need to protect against proactively.<\/p>\n With the number of smartphone users expected to\u00a0reach over five billion by 2019<\/a><\/u>, you should expect your employees to do their work tasks, including retrieving files, on their business\u00a0and\u00a0<\/em>personal devices. While unrealistic to expect otherwise, that device double-dipping creates a weak link in your security. A modern BYOD (bring your own device) policy solves for that while often reducing costs and improving security.<\/p>\n Employees working remotely have diverse needs. The \u201c6 Common Types of Remote Workers<\/a>\u201d ebook identifies six types of remote workers and how to support them with a secure and adaptable infrastructure. (Requires registration) Link\u00a0here<\/a>.<\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n Now, let\u2019s look at 10 tips to help ensure you, your employees, and your customers stay safe on the go!<\/p><\/blockquote>\n Configure devices to automatically download app updates to ensure you always have the latest version of the software, including the newest fixes, patches, and improvements. Staying up-to-date ensures the security software stays current, thus better protecting the device against the latest known threats, no matter where should go.<\/p>\n Modern, cloud-based tools, like Office 365 and Dynamics 365, give you and your employees access to data anytime, anywhere, which enables remote working. Plus, in the Microsoft Cloud, you stay protected with the latest software and patches.<\/p>\n We all love free WiFi, but it comes with risks. Someone else on the network can intercept your connection and try to access your device. These so-called \u201cman in the middle\u201d attacks enable hackers to relay and\/or alter information. Especially nasty people even spoof entire hotspots if the mood strikes them. If you or your employees feel like they need to use public WiFi, ensure you use it via a strong VPN.<\/p>\n Apps make our lives simpler and more productive. However, apps can ask for permissions to access various things on your phone, such as your camera, microphone, and your files. While sometimes necessary, giving them access makes you more vulnerable to hacking. Pay attention to what your apps ask to access and decide if the risk\/reward tradeoff still makes sense.<\/p>\n It may sound paranoid, but a USB charging cord can exchange data. When you attach your phone to an unknown device or power source, such as an airport or train, it could potentially let someone connect to your phone and steal important data, as well as leaving nasty things on your device. Whenever possible, charge devices in a secure, trusted place, such as your home or office.<\/p>\n Use multi-factor authentication on any device that has access to business data. Also, use trickier passwords or biometric logins to make your devices more difficult to open. The harder the mobile device to break into, the less likely someone will make the effort to do so. Also, get into the habit of locking your mobile device when you\u2019re done with it.<\/p>\n Did you know that, if you run the right software, you can \u201cwipe\u201d a device of its data if it goes missing, gets lost, or stolen? This one security feature can help prevent the wrong person from accessing your data, network, etc. Make sure your IT policy describes what to do when a device gets compromised, including who to contact.<\/p>\n Here\u2019s one for retailers. Nielsen\u2019s Canadian Mobile Wallet syndicated study found that 29% of Canadian smartphone users already actively use smartphones as a payment system. And why not? It\u2019s very convenient and saves everyone time. Even so, businesses and consumers need to ensure they have security measures in place to transact safely.<\/p>\n Unfortunately, according to Verizon\u2019s 2016 Data Breach Investigations Report, POS breaches represent one of the most common types of cyberattacks. That\u2019s because out-of-date systems rarely offer automatic\/robust security updates. To do mobile payments securely, many businesses will need to upgrade their POS (point of sale) solution.<\/p>\n In addition to faster and safer technology, NFC (near-field communication) payments offer extra security for customers. EMV chip\/pin cards transact more securely than cards with magnetic strips, making them almost impossible for criminals to copy data. Plus, payments made on the phone use tokenization\u2014meaning random, not actual card numbers get transmitted.<\/p>\n You can introduce a solution like\u00a0Enterprise Mobility + Security<\/a>, which is part of Microsoft 365, to empower mobile employees, without complicated setup or IT management. Teams can configure different users and devices with policies and certificates to make sure the right people have the right access.<\/p>\n Enterprise Mobility + Security gives you more control of your data. You decide who has access to it and control what they can and can\u2019t see. When a new employee or contractor comes on board, for example, you can make the changes yourself. You can even get updates and insights into the latest threats aimed at your customers.<\/p>\n Employees working remotely have diverse needs. The \u201c6 Common Types of Remote Workers<\/a>\u201d ebook identifies six types of remote workers and how to support them with a secure and adaptable infrastructure. (Requires registration) Link\u00a0here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Welcome to\u00a0Day 6 of Business Self-Defense\u00a0from Microsoft Canada. In this post about security on the go, we talk about how small and medium-sized businesses with employees who work in the field can defend themselves from hackers and other threats. Mobile devices have changed not only the way we interact with our family and friends, but<\/p>\n","protected":false},"author":379,"featured_media":4047,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[1],"post_tag":[294],"content-type":[],"coauthors":[300],"class_list":["post-4044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-smb"],"yoast_head":"\nFirst: a reality check<\/h2>\n
Get the ebook<\/h2>\n
1) Stay up-to-date<\/h2>\n
2) Use modern tools<\/h2>\n
3) Avoid \u201cfree\u201d WiFi spots<\/h2>\n
4) Watch what you install<\/h2>\n
5) Look where you charge<\/h2>\n
6) Use smarter logins<\/h2>\n
7) Remote wiping<\/h2>\n
8) Transact securely<\/h2>\n
9) Upgrade your POS<\/h2>\n
10) Embrace NFC & EMV<\/h2>\n
Security on the go<\/h2>\n
Stay in charge<\/h2>\n
Get the ebook<\/h2>\n