Connect with us

Hi, what are you looking for?

HEADLINES

How small companies can secure mobile devices on a budget

Small businesses can still use mobile technology – including employee-owned devices – without a huge investment of time or money.

Very small businesses (VSBs) with fewer than 25 employees have the same rate of mobile device adoption as large enterprises. However, most VSBs lack the security awareness, technical expertise, and budget needed to properly protect company-issued or employee-owned (BYOD) mobile devices.

A Kaspersky Lab survey asked 3,900 IT professionals worldwide about IT challenges they encountered over the previous 12 months, and 34% of VSBs said they had managed the integration of mobile devices into their business.

What’s noteworthy is this rate is nearly identical to the rate of mobile integration reported by enterprises, which was 35%. This means the smallest companies in the world are adopting mobile technology at essentially the same rate as huge companies with more than 5,000 employees.

In fact, VSBs actually reported a higher rate of mobile adoption than small businesses with 26-99 employees, as well as large businesses with 1,500-5,000 employees. VSBs reported 6% more mobile integration than small businesses (defined as 26-99 employees), and 2% more than large businesses (defined as 1,500-5,000 employees).

Advertisement. Scroll to continue reading.

These statistics certainly cast doubt on any perceptions that VSBs are confined to antiquated technology or slow to invest in IT.

Mobile technology may not be restricted to businesses based on their size, but there are other key factors to consider. Expertise and resources are the most obvious limitations of VSBs, which frequently don’t have dedicated IT staff to manage technology implementations.

These limitations may lead to a knowledge gap even amongst security-minded business owners. For example, 31% of VSBs listed “Securing Mobile/Portable Computing Devices” as one of their top-three IT security priorities for the next 12 months (a rate comparable to the 34% adoption rate from the previous 12 months).

But when asked about BYOD (Bring Your Own Device) policies, where employees use their own mobile devices for business purposes, the survey uncovered a perception-gap based on company size.

When surveying attitudes towards technology trends, 28% of VSBs agreed that BYOD introduces an increased IT security risk to their business.

Advertisement. Scroll to continue reading.

But large businesses and enterprises had a response rate that was nearly twice the VSB response, with 52% and 48% respectively agreeing about the risks presented by BYOD.

Is it possible that VSBs are overlooking employee-owned mobile devices as a security risk?

This seems like a particularly troubling possibility, given that VSBs and their limited budgets are most likely to view employee-owned devices as a cost-savings measure and gladly welcome these devices onto their networks.

Common threats from employee-owned mobile devices include malware or rouge applications connecting to the company’s network via the employee’s device, or company data disappearing along with a lost or stolen employee device.

Steps for Mobile Security on a Budget

Advertisement. Scroll to continue reading.

Realizing that most VSBs lack the budget and technical sophistication for advanced mobile security solutions, small businesses can still use mobile technology – including employee-owned devices – without a huge investment of time or money.

A mixture of common-sense and the right technology can go a long way to securing mobile devices, and help the owners of a startup get back to running their business.

1) Employee Education: the first lines of protecting your business data are employees with security mindsets.

Make sure new employees know that if their smartphones or tablets contain workplace information, that device shouldn’t be subjected to unnecessarily risky usage habits (e.g., browsing questionable websites), and if the device is lost or stolen, it should be reported immediately to the employer, not days later.

2) Basic Anti-Theft: an inexpensive piece of software that can remotely-wipe the data from missing or stolen devices is essential.

Advertisement. Scroll to continue reading.

Some devices offer similar functions built-in, and there are many third-party applications that can accomplish this task. But make sure an employee understands that if their device is wiped, that typically means any personal information on the device is deleted as well.

3) Avoid Complexity: a newly-created startup business with five employees can’t spend hours purchasing, deploying, and managing a business-grade security product that wasn’t built for their purposes.

Avoid purchasing a larger product than the business needs, and stick to core mobile security features.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

HEADLINES

Kaspersky has enhanced its Kaspersky Industrial CyberSecurity (KICS), a native XDR Platform for industrial enterprises, and streamlined Managed Detection and Response (MDR) for Industrial...

White Papers

One in three industrial companies encounter regular network problems, with 45% of businesses experiencing them a few times a month, while only 12% of...

HEADLINES

Located in the Kaspersky office, the new facility will provide the company’s stakeholders with services ranging from an overview of Kaspersky’s practices, to a...

HEADLINES

Smart and Maya emphasize that they never send SMS with links requesting login credentials, personal information, or account verification. If you receive such a...

HEADLINES

In this new scheme, scammers call potential victims claiming that their phone number has been linked to illegal activities. The fraudsters would then extort...

Advertisement