Protecting your business data when you're out on the road

Protecting your business data when you're out on the road
Avoid disaster by protecting your mobile tech

According to London's Metropolitan Police, as many as ten thousand mobile phones are stolen every month. For business employees, losing valuable and even sensitive information through mobile, iPad and Android tablet and laptop theft, can be catastrophic. Fortunately, there are a huge number of practical things that can be done to protect mobile devices.

First of all, mobile phones and computers can be registered at the UK National Property Register which can help police to track stolen goods, and should they be found will speed up their return.

Log your phones unique IMEI number

Secondly, businesses could record the details of their electronic serial numbers (ESNs) and consider taking out separate insurance to cover mobile devices. All mobile phones have an IMEI number which is a unique identifier for the phone. This can be obtained by typing *#06# (star hash 06 hash) into your mobile phone and hitting dial, the phone will then return a unique fifteen-digit number that identifies that phone to the networks. As another line of defence you could also property-mark the phones with the company's postcode and building number, to help police identify the owners should they be found later.

Another popular option for protecting mobile devices is the asset tag, which is an individually-numbered security sticker that you attach to the computer. These are durable aluminium or plastic stickers that bind permanently to the machine, and have a unique barcode or serial number printed on them. This unique identifier enables businesses to build up a database of their assets, and the barcode means you can scan them in and out of the office.

Software to protect your laptop

Laptops should have adequate security software, as is the case with office-based ones. The sky is the limit when it comes to implementing security software, but there is a minimum level of security that any business should have.

This should comprise antivirus software, to catch viruses and Trojan horse programs, anti-spam software to control spam which could contain malicious code or links to hacker web sites, and anti-phishing software to detect financial hacking techniques. The security suite should also have a good firewall to monitor the laptop's Internet connections and prevent hacking attempts.

Connecting to wireless networks securely

As with office computers that use a wireless network, it is essential to use encryption technology to scramble wireless data in transit, and make sure that employees connect only to networks that they know are secure. This is particularly important when accessing public wireless networks in cafes and travel centres. There are ways for hackers to spoof the name of the public Wireless network and to record passwords and usernames as well as take credit card details, and to access other people's information, via the networks.

Businesses that access information remotely might want to set up a virtual private network (VPN) to connect securely with the office. VPNs come in two forms; a software application, or a dedicated hardware appliance. The VPN adds an additional layer of security over the internet allowing you to connect to your home network securely even over a public wireless network. The remote worker tends to access this secure connection using a login name and secure password, but they might also use a hardware security token, which is a little device that generates a unique password every few minutes. (RSA SecurID is one of the more popular hardware token security systems.)

Fingerprint readers and disk encryption

Many notebooks now come with additional security features such as biometric fingerprint recognition, which only let the right person login. Full disk encryption is another option, and this will secure part or all of the information on a computer's hard drive, and render the machine useless to any criminal who tries to steal it. This can either be part of the laptop hardware, at the operating system level – Windows users can encrypt data on their hard drive via the Control Panel, but it's set to off by default, - or it can be installed as an add-on via a software application.

Then there is remote-wipe technology, which lets the business delete all the information on a mobile device by sending a message over the network, and this also resets the mobile phone's settings to the factory defaults. Inexpensive mobile phone tracking services are also available that give businesses the ability to track lost or stolen devices by GPS.

Security best practice

As well as using tools and techniques to keep mobile data secure, mobile workers are also advised to use good security practices when out and about.

So, they should keep their phones and laptops out of sight in a bag when not in use; use their phone's security lock code; and have a secure password to login. If their mobile computer is stolen, they should report it to the police (and the business) immediately, additionally to avoid possible costly phone charges you should inform your mobile service provider as soon as you are aware that a phone is stolen or lost.

Latest in Pro
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Racks of servers inside a data center.
Modernizing data centers: an efficient path forward
Dr. Peter Zhou, President of Huawei Data Storage Product Line
Why AI commonization is so important for business intelligent transformation and what Huawei’s data storage has to offer
Wix automation
The world's leading website builder aims to save businesses time with new tool
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over