For ten years, Minneapolis IT support company Tech Guru has been fully immersed in the business technology landscape. What was once a twinkle in everyone’s eyes – smartphones and mobile technology – has become ubiquitous. Mobile tech may be all over the workplace, but there’s still a lot to be learned about the Bring-Your-Own-Device Revolution.
Proper Device Setup
Need proof that Americans are more hooked than ever to on-the-go technology? One study reports that 75% have taken their smartphone to the bathroom. Another statistic reveals that 37% of people work from multiple locations. And this year, for the first time ever, mobile apps overtook PCs for accessing the internet.
Employees of every company are using their own laptops, tablets, and mobile devices to access and store their employer’s private data. So what can a business do to make sure their client profiles and trade secrets aren’t going to be seen by an unauthorized stranger? Take a few steps now to protect your device:
- Auto-lock the device after five minutes idle.
- Enable automatic updates for apps and operating system.
- Disable Bluetooth and Wifi radios when not in use.
Sniff Out The Bad Guys
Another important step is to familiarize yourself with the anatomy of a URL, as scammers abound when using the internet on a mobile device. For example:
- www. – Subdomain
- techguruit – domain name
- .com – Top Level Domain
- /blog – folder on the server
- pagename.aspx – name of web page on the server
The domain name (between the first set of dots from the right) is the root domain and ultimately the source of your website. The domain must be registered with a domain registrar.
Subdomains, folder names, and page names can all be easily manipulated. Be wary of URLs with lots of subdomains strung together. Even better, enter the URL yourself in a browser to go directly to the website instead of clicking on the link.
Concerned? Call IT.
Lastly, take swift action on any suspected breach in security. Call your favorite IT person for help. Pick up the phone if:
- Your email account is sending spam messages to your contacts
- You think you might have entered information into a phishing website
- Your phone is lost or stolen
- You are not sure if an app is safe to install
There’s a learning curve involved with bringing your mobile devices to work, but the convenience is worth the small amount of hassle that accompanies security protection. Until mobile security catches up with technology trends, take care as best you can!
Latest posts by Eric Mlsna (see all)
- Software vs. human? What Should You Automate vs. Not? - June 14, 2016
- How To Work Remote Without Driving Yourself Insane - June 2, 2016
- A Mega-List Of Interesting, Lesser Known Productivity Tools - April 19, 2016