Top Five Tips for Securing Mobile Devices Before the Holidays
Have a worry-free holiday when it comes to your mobile devices by following these five security steps.
December 01, 2017 at 08:00 AM
11 minute read
The holiday season is upon us when, in the hustle and bustle, we can sometimes overlook securing one of the most important communication and productivity tools in our modern lives: mobile devices. Mobile phones, laptops and tablets are ubiquitous. Whether BYOD (bring your own device) or company-provided, we take for granted when this technology works day in and day out. We are lost—and your law firm's security is threatened—when they fail or get damaged, stolen or compromised. Here are some tips to help you minimize technological difficulties during this busy time of year.
The U.S. Department of Homeland Security defines threats and risks in five separate layers. We'll cover each with one or more methods to secure your device.
1. Mobile Device Technology Stack: The first thing employees or IT staff can do to ensure a solid foundation of up-to-date features and security fixes is to use the manufacturer's latest software update for the device(s) being used. Whether you utilize iOS, Android, Windows or a combination of each, regularly checking for device updates will ensure that you are taking advantage of an operating system that has closed any recently found holes attackers can compromise.
Some new OS updates may introduce compatibility issues, so be sure to check that all your applications will work prior to updating. Keeping your applications updated will also help secure your devices.
Make sure your device is regularly backed up. This will allow you to “roll back” to the last known good configuration if an update causes a problem. Backups should never be overlooked!
2. Mobile Networks: All devices connected to the internet to share data need to be part of a network. These days you can find a way to connect almost anywhere you are. From the local coffee shop to a hotel you are staying at, all have convenient methods to communicate with your colleagues and families during the holidays.
An important thing to remember is to ensure that the Wi-Fi network you are connecting to is legitimate and secure. Does it require a password that will ensure encryption (preferably WPA2) or is it open to anyone with no security at all? The former should be a requirement for anyone traveling away from the office.
Be mindful of any access points that are not sanctioned by the establishment you are in and resist connecting to them. Always use a VPN (virtual private network) regardless of where you connect as that will add another layer of encryption and security to your connection. Connecting to an open access point risks allowing anyone monitoring or “sniffing” that network to procure your passwords and wreak havoc. Finally, using two-factor authentication can also create another important layer of security when connecting to corporate networks over these public wireless access points.
3. Device Physical Systems: An obvious way for anyone to gain access to your device is via physical manipulation. If you do not protect your device with a strong password that includes a combination of uppercase, lowercase, numbers and/or special characters, you make it easier for someone to “brute force” a way into your device by guessing your password. If you don't have a password, anyone can pick up your phone or tablet and view the data on it or, even worse, send data out to others in your name.
One way to take security one step further is to utilize the biometric password features of your device. This will include options depending on your hardware such as facial recognition or fingerprint readers. These technologies are very hard to bypass, and you carry your password with you wherever you go.
The next step is to set up your device to automatically lock the screen after sitting idle for a minute. This will require you or anyone who wants to use the device to enter the password, thwarting unauthorized tampering or snooping.
4. Mobile Applications: There are applications you can download for your laptop, tablet or phone that can open the door for malicious use or privacy intrusion. Most “app stores” are closely controlled, but sometimes there are applications that get past the vetting process. Laptops are more at risk due to the ability to install any software if you have the privileges to do so and not being limited to a specific app store.
Having a proper first line of defense by installing a modern anti-malware and anti-virus product from a reputable software publisher is paramount to keeping the bad guys out. This will also help secure your machine from software downloads and installs that are infected with digital bugs or viruses. Sometimes these infections can occur by casually clicking on a pop-up ad by accident. Updating your anti-malware and anti-virus product as needed will keep it smarter and able to detect the latest threats.
5. Mobile Enterprise: Work with your IT department or IT vendor prior to taking your vacation or holiday to ensure that your device(s) are fully protected, updated and tested to connect back to your office. You don't want to be thousands of miles away and unable to work or communicate with your peers or clients after you find out your password has expired or there is some other problem blocking your connection. Take the time to speak to your technologists and have them check your software and hardware for updates, a cleanup and any other items you may need for travel such as power converters for plugging your devices in to charge in another country.
Time spent on these activities will save you potentially hours of frustration while out of the office and trying to troubleshoot problems over the phone. Or worse: without a connection to the internet, your IT staff or vendor won't be able to remotely connect to help troubleshoot your problems.
Tim Sheehan is the director of professional services at Innovative Computing Systems. He can be reached at [email protected].
The holiday season is upon us when, in the hustle and bustle, we can sometimes overlook securing one of the most important communication and productivity tools in our modern lives: mobile devices. Mobile phones, laptops and tablets are ubiquitous. Whether BYOD (bring your own device) or company-provided, we take for granted when this technology works day in and day out. We are lost—and your law firm's security is threatened—when they fail or get damaged, stolen or compromised. Here are some tips to help you minimize technological difficulties during this busy time of year.
The U.S. Department of Homeland Security defines threats and risks in five separate layers. We'll cover each with one or more methods to secure your device.
1. Mobile Device Technology Stack: The first thing employees or IT staff can do to ensure a solid foundation of up-to-date features and security fixes is to use the manufacturer's latest software update for the device(s) being used. Whether you utilize iOS, Android, Windows or a combination of each, regularly checking for device updates will ensure that you are taking advantage of an operating system that has closed any recently found holes attackers can compromise.
Some new OS updates may introduce compatibility issues, so be sure to check that all your applications will work prior to updating. Keeping your applications updated will also help secure your devices.
Make sure your device is regularly backed up. This will allow you to “roll back” to the last known good configuration if an update causes a problem. Backups should never be overlooked!
2. Mobile Networks: All devices connected to the internet to share data need to be part of a network. These days you can find a way to connect almost anywhere you are. From the local coffee shop to a hotel you are staying at, all have convenient methods to communicate with your colleagues and families during the holidays.
An important thing to remember is to ensure that the Wi-Fi network you are connecting to is legitimate and secure. Does it require a password that will ensure encryption (preferably WPA2) or is it open to anyone with no security at all? The former should be a requirement for anyone traveling away from the office.
Be mindful of any access points that are not sanctioned by the establishment you are in and resist connecting to them. Always use a VPN (virtual private network) regardless of where you connect as that will add another layer of encryption and security to your connection. Connecting to an open access point risks allowing anyone monitoring or “sniffing” that network to procure your passwords and wreak havoc. Finally, using two-factor authentication can also create another important layer of security when connecting to corporate networks over these public wireless access points.
3. Device Physical Systems: An obvious way for anyone to gain access to your device is via physical manipulation. If you do not protect your device with a strong password that includes a combination of uppercase, lowercase, numbers and/or special characters, you make it easier for someone to “brute force” a way into your device by guessing your password. If you don't have a password, anyone can pick up your phone or tablet and view the data on it or, even worse, send data out to others in your name.
One way to take security one step further is to utilize the biometric password features of your device. This will include options depending on your hardware such as facial recognition or fingerprint readers. These technologies are very hard to bypass, and you carry your password with you wherever you go.
The next step is to set up your device to automatically lock the screen after sitting idle for a minute. This will require you or anyone who wants to use the device to enter the password, thwarting unauthorized tampering or snooping.
4. Mobile Applications: There are applications you can download for your laptop, tablet or phone that can open the door for malicious use or privacy intrusion. Most “app stores” are closely controlled, but sometimes there are applications that get past the vetting process. Laptops are more at risk due to the ability to install any software if you have the privileges to do so and not being limited to a specific app store.
Having a proper first line of defense by installing a modern anti-malware and anti-virus product from a reputable software publisher is paramount to keeping the bad guys out. This will also help secure your machine from software downloads and installs that are infected with digital bugs or viruses. Sometimes these infections can occur by casually clicking on a pop-up ad by accident. Updating your anti-malware and anti-virus product as needed will keep it smarter and able to detect the latest threats.
5. Mobile Enterprise: Work with your IT department or IT vendor prior to taking your vacation or holiday to ensure that your device(s) are fully protected, updated and tested to connect back to your office. You don't want to be thousands of miles away and unable to work or communicate with your peers or clients after you find out your password has expired or there is some other problem blocking your connection. Take the time to speak to your technologists and have them check your software and hardware for updates, a cleanup and any other items you may need for travel such as power converters for plugging your devices in to charge in another country.
Time spent on these activities will save you potentially hours of frustration while out of the office and trying to troubleshoot problems over the phone. Or worse: without a connection to the internet, your IT staff or vendor won't be able to remotely connect to help troubleshoot your problems.
Tim Sheehan is the director of professional services at Innovative Computing Systems. He can be reached at [email protected].
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllNatural Language Processing and Survey Data: LDA and the Importance of Topic Modeling
6 minute readNatural Language Processing and Survey Data: Word Clouds, Associations, Sentiment and Bigrams
7 minute readIntelligence in the Modern World: The Opportunities and Barriers of Data in Today's Investigations
6 minute readTrending Stories
Who Got The Work
Dechert partners Andrew J. Levander, Angela M. Liu and Neil A. Steiner have stepped in to defend Arbor Realty Trust and certain executives in a pending securities class action. The complaint, filed July 31 in New York Eastern District Court by Levi & Korsinsky, contends that the defendants concealed a 'toxic' mobile home portfolio, vastly overstated collateral in regards to the company's loans and failed to disclose an investigation of the company by the FBI. The case, assigned to U.S. District Judge Pamela K. Chen, is 1:24-cv-05347, Martin v. Arbor Realty Trust, Inc. et al.
Who Got The Work
Arthur G. Jakoby, Ryan Feeney and Maxim M.L. Nowak from Herrick Feinstein have stepped in to defend Charles Dilluvio and Seacor Capital in a pending securities lawsuit. The complaint, filed Sept. 30 in New York Southern District Court by the Securities and Exchange Commission, accuses the defendants of using consulting agreements, attorney opinion letters and other mechanisms to skirt regulations limiting stock sales by affiliate companies and allowing the defendants to unlawfully profit from sales of Enzolytics stock. The case, assigned to U.S. District Judge Andrew L. Carter Jr., is 1:24-cv-07362, Securities and Exchange Commission v. Zhabilov et al.
Who Got The Work
Clark Hill members Vincent Roskovensky and Kevin B. Watson have entered appearances for Architectural Steel and Associated Products in a pending environmental lawsuit. The complaint, filed Aug. 27 in Pennsylvania Eastern District Court by Brodsky & Smith on behalf of Hung Trinh, accuses the defendant of discharging polluted stormwater from its steel facility without a permit in violation of the Clean Water Act. The case, assigned to U.S. District Judge Gerald J. Pappert, is 2:24-cv-04490, Trinh v. Architectural Steel And Associated Products, Inc.
Who Got The Work
Michael R. Yellin of Cole Schotz has entered an appearance for S2 d/b/a the Shoe Surgeon, Dominic Chambrone a/k/a Dominic Ciambrone and other defendants in a pending trademark infringement lawsuit. The case, filed July 15 in New York Southern District Court by DLA Piper on behalf of Nike, seeks to enjoin Ciambrone and the other defendants in their attempts to build an 'entire multifaceted' retail empire through their unauthorized use of Nike’s trademark rights. The case, assigned to U.S. District Judge Naomi Reice Buchwald, is 1:24-cv-05307, Nike Inc. v. S2, Inc. et al.
Who Got The Work
Sullivan & Cromwell partner Adam S. Paris has entered an appearance for Orthofix Medical in a pending securities class action arising from a proposed acquisition of SeaSpine by Orthofix. The suit, filed Sept. 6 in California Southern District Court, by Girard Sharp and the Hall Firm, contends that the offering materials and related oral communications contained untrue statements of material fact. According to the complaint, the defendants made a series of misrepresentations about Orthofix’s disclosure controls and internal controls over financial reporting and ethical compliance. The case, assigned to U.S. District Judge Linda Lopez, is 3:24-cv-01593, O'Hara v. Orthofix Medical Inc. et al.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250