Triangle Software

5 Cybersecurity Tips - How to Keep Your Mobile Device Safe

Cybersecurity Tips

Many businesses are embracing digital transformation amidst the COVID-19 pandemic. For some, it may involve the procurement of mobile devices for employees to adopt paperless processes, such as mobile forms software

The number of cyber attacks have increased throughout the pandemic and the surge in remote working may be the reason why. This is due to workforces not being fully equipped to work safely from home. 

Your employees may be required to access sensitive client and business information on their mobile device, so it’s incredibly important they are given the correct cybersecurity training to prevent attacks from hackers.

Here are our top five cybersecurity tips for mobile devices.

1. Strong Lock Screen Password

The lock screen password is the first line of defence. Depending on the device, the user will have an option to set a password pattern, a pin number, a written password or facial / fingerprint recognition.

For password patterns it’s best to use the maximum number of points when creating the pattern - in most cases this is six. More points means more possibilities, therefore making it harder to break. It’s also worth avoiding simple patterns, like a square, or an ‘L’ shape - these can be guessed easily!

Written passwords are harder to guess when there are more characters - advise your employees to use a combination of letters, numbers and special characters. Avoid using obvious phrases like names and dates. 

Newer mobile devices will have facial or fingerprint recognition to open the lock screen. These are much more difficult to hack than the other password types we have mentioned since it is so unique to the user. 

2. Utilise a Password Manager App

It’s important to never repeat a password - ask your employees to use a different password for each app or account they use. 

But how will your staff remember multiple, lengthy passwords? 

Password managers, such as LastPass, can suggest new passwords, store current passwords and autofill passwords when the user visits an account that requires a login. All the user has to do is remember one secure master password - but even this should be changed regularly to keep it secure. 

3. Avoid Public Wi-Fi Networks

It can be tempting to use public wi-fi when you’re on the move, but it can be dangerous. Public wi-fi networks are unsecure and can be easily infiltrated by hackers. 

Your employees should avoid connecting to public networks if they’re using their mobile device to access sensitive information such as:

  • Emails
  • Money transfers
  • Client information e.g. numbers, addresses and other personal details

Only connect to secure wi-fi networks to complete work on a mobile device. If your employee must connect to a public network, encourage them to use a VPN - it creates an encrypted data tunnel that keeps online information secure and safe from hackers.

4. Set-up Remote Tracking

Both Apple and Android devices include apps to track a mobile device if it goes missing. The location of the device will appear on a map so it can be tracked. You can also remotely lock the device and if necessary, erase all of its data.

5. Mobile Device Use Company Policy

If more of your employees are required to use mobile devices for work, it’s essential that the business’s mobile device usage policy is up to date. You should also ensure that all of your staff are aware of the policy’s guidance and rules. 

Your policy should outline:

  • Employees’ responsibilities when accessing company programmes;
  • Actions to take if their mobile device is misplaced so you can react quickly;
  • Education on secure password protection; 
  • Rules on using personal devices for work and;
  • Restrictions to the data that is accessible from a personal device.

Final Note

There are plenty of methods your business can adopt to keep your company’s mobile and tablet devices safe. Educating your employees on how to use their mobile devices securely will help to prevent hackers and the loss of sensitive information.