Do you know somebody who knows me? Are we “linked” somehow?
Here’s what I think you should generally ask that person:
Securing mobile devices has become increasingly important in recent years as the numbers of the devices in operation and the uses to which they are put have expanded dramatically. The problem is compounded within the enterprise as the ongoing trend toward IT consumerization is resulting in more and more employee-owned devices connecting to the corporate network.
Following are three ways to make sure your network is secure from mobile threats:
This is your first line of defense. If someone wants to access your device, they will first need to break this code. This is not an easy task, and can operate as a deterrent against theft. Some device manufacturers have an option to automatically wipe your device after a few unsuccessful attempts at your passcode or pin; so, even if your phone is stolen, your information cannot be accessed. For this reason, you should look for MSPs that offer mobile device management (MDM) in their portfolio of services.
There are thousands of applications out there, and many involve more than just crushing candy or shooting birds at pigs. Certain software can help you locate your lost or stolen device through its GPS. Apple offers a service like this for their mobile devices aptly named Find my iPhone. For Android users, the Android Device Manager offers these services. Windows Mobile users also have this option from the Windows Phone website. Similarly, many third party applications are available in each of the app stores.
Utilizing an Antivirus and Malware scanner is never a bad idea. Your phones are mini-computers, and just like your “big” computer – they need to be cleaned up from time to time. Malware and Virus threats can compromise information stored on your mobile devices. Malware has a snowball effect, and can continuously pile up until it slows downs or stops your device. Look for an MSP that offers Malwarebytes as a solution to this problem for both mobile devices and computers. It will keep your end points clean and secure from outsiders. Consider Webroot as an antivirus application that scans your downloaded apps and devices for any threats. Many MSPs offer Webroot antivirus in their managed IT services package. Equipped with Internet security, this defense will give you a heads up if it detects any malicious activity from your device’s browser.
A long, long time ago, when The Internet Design Firm existed (Scott Smeester’s 1990s startup), consulting firms used to get into LONG and BIG contracts, for HUGE amounts of work. They used to generate big ‘ol requirements, and create phases in the project to make sure there was no scope creep! Changes?! Pfftt!
In 2002, Mr. Peter Provost, now of the Microsoft Corporation, paradigm shifted me into 2016, which is why I’m here now. He told me that the way we were doing it was bass ackwards. He said we should be doing smaller projects, with shorter timespans between deliverables, with the ability of the client to make changes (oh, God!). No more huge commitments! He told us this was the “Agile Development Process” and it was meant to keep software developers and clients from butting heads.
So that’s how we do business now, with our clients and with our vendors. It allows us (all) to iterate. It allows us to succeed in more projects.
** The picture of the two college guys is merely coincidental. That is not me and Peter Provost, but those types of things did happen in the vicinity of Peter. Those two cats are SO party’n! Courtesy of Sun International South Africa.