ARE YOUR MOBILE DEVICES SAFE?

 Mobile Device Management

Posted in blogNewsSecurity  Share

As the COVID-19 outbreak continues to impact industries throughout the world, invest advisory and accounting firms have enabled employees to work remotely. While working from home may be nothing new to some, the realities of COVID have forced organizations to shift to a full-on work from home model, in order to flatten the curve.

Working from home increases the risk of a compliance deficiency–failure to protect a company’s sensitive data.

While companies have instituted a wide array of countermeasures to combat these potential issues, we believe a firm must utilize a mobile device manager (or MDM). MDMs enable IT managers and directors to include which devices can be used for business purposes (email, file/folder management, downloads, etc). These supervision and security tools add an additional layer of protection against potential compliance violations.

WHY MDM?

The importance of approved devices has always been a foundation of a firm’s mobile device policy; however, it becomes even more vital as employees (that usually work in office) are now working from home.

Regardless if a firm provided devices during the initial outbreak or has instituted a BYOD (bring your own device) model, these expedient responses may create undue risk if the device is not managed by the firm.

Firms generally turn to MDM solutions for three key reasons:

  1. MDM gives them better control over all of the companies’ portable Windows and Mac devices (regardless if the device is firm provided or user provided)
  2. MDM gives them control over mobile accessibility
  3. Meeting SEC guidance for cyber security

Mobile device management applications and programs are the best tool for a firm’s compliance department to contain the risks associated with mobile devices used for business purposes. This is especially important because firms can now approve specific messaging systems or limit communication to email accounts to ensure compliance.

Recently, the Securities and Exchange Commission site MDMs as a best practice which can help manage the cyber security risks associated with mobile devices. MDMs ensure that antivirus software is used and up to date. MDMs can collectively stop mobile devices from being infected with/transmitting Trojans and malware just like desktops or laptops.

The MDM solution that you choose for your business should depend on a number of factors which include (and are not limited to): access controls, device types and how user-friendly the solution is for your system administrator/IT Team to set up and maintain.

The main goal of any MDM or cyber-security solution is to avoid a cyber incident. Of course, every firm should strive to be follow compliance guidelines, but the cyber threats posed by mobile devices pose a very real risk to your firm. As you move forward, the one thing you have to be honest about is your capability bandwidth–Do you and your team actually have the time to handle this for your firm?

TetherView MDM

TetherView’s Pocket Protector? uses our industry-leading end-user computing (EUC) technologies to help your team deliver and manage any application, on any device—simply and securely.

With Pocket Protector?, IT teams (or TetherView) can manage and secure all endpoints (including desktops) running any OS including: Windows 10, macOS, and Chrome OS etc. and any app—across diverse use cases and all from a single holistic platform.

要查看或添加评论,请登录

Brian Baker的更多文章

  • 5 QUESTIONS TO ASK WHEN HIRING A BUSINESS PROCESS MANAGEMENT CONSULTANT

    5 QUESTIONS TO ASK WHEN HIRING A BUSINESS PROCESS MANAGEMENT CONSULTANT

    5 QUESTIONS TO ASK WHEN HIRING A BUSINESS PROCESS MANAGEMENT (BPM) CONSULTANT Business process management (BPM) is an…

    1 条评论
  • YOU THINK YOU KNOW CYBER SECURITY?

    YOU THINK YOU KNOW CYBER SECURITY?

    19 Feb Think you have a good handle on cyber security? Posted in blog, News, Security Share Congratulations, you lead a…

    1 条评论
  • IS YOUR WORK FROM STRATEGY MAKING YOU MORE VULNERABLE?

    IS YOUR WORK FROM STRATEGY MAKING YOU MORE VULNERABLE?

    18 Mar Don’t get burned by your WFH strategy Posted in blog, Events, News, Security Share For most CEOs the possibility…

  • THE RIGHT WAY TO MANAGE YOUR REMOTE TEAM

    THE RIGHT WAY TO MANAGE YOUR REMOTE TEAM

    How to successfully manage your remote team Posted at 12:19h in blog, Security Share Working from home has been…

  • VPN's Aren't Always A Good Thing

    VPN's Aren't Always A Good Thing

    Eliminate VPNs to secure your business. The Risk.

  • MDM - Protect ALL Your Mobile Devices

    MDM - Protect ALL Your Mobile Devices

    21 Apr Mobile Device Management Posted in blog, News, Security As the COVID-19 outbreak continues to impact industries…

  • WFH IS HERE TO STAY

    WFH IS HERE TO STAY

    14 Apr Why WFH is Here to Stay Posted at 10:41h in blog, News, Security For the past 15 years, organizations have made…

  • WHY YOU MUST ELIMINATE VPN'S

    WHY YOU MUST ELIMINATE VPN'S

    Creators of the Digital Bunker? Eliminate VPNs Learn why VPNs are jeopardizing the security of your business Most…

  • Right Way and Wrong Way to Work From Home

    Right Way and Wrong Way to Work From Home

    Don’t get burned by your WFH strategy blog, Events, News, Security Share For most CEOs the possibility of a pandemic…

社区洞察

其他会员也浏览了