Complete Story
 

02/11/2019

Mobile Technology Demands Two-Factor Authentication

A valuable article submitted by OSAE Member thinkCSC

As mobile device use becomes ubiquitous in personal and professional capacities, businesses face additional hurdles when developing protocols to effectively secure their IT infrastructures and protect data. The tendency is that mobile users casually agree to give access to personal information for the use of third-party apps, servers, and networks. These third-party connections then become potential threats to your business when that same device is connected to your network and is used for work-related activities. Mobile device security that includes two-factor authentication is a crucial piece of your cybersecurity strategy.

Mobile Apps Are Easy to Add but Hard to Monitor
Social media and messaging apps aren’t just for personal use anymore. Businesses are leveraging these apps to encourage collaboration and innovation in the workplace. New communication apps are designed specifically for the workplace. But do they meet your security specifications? It’s rare for such apps, which require access to your network and data, to specify how and when that data will be used. To better protect your data, enact policies that prevent unapproved apps from being downloaded to corporate devices, and require personal devices used in the workplace or for work at home to implement your mobile security protocols.

Free WiFi Can Cost You
When working outside of the home or office, it can be tempting to save data or connect to a stronger signal with corporate mobile devices, but public WiFi is rarely secured. Hackers can tap into these unsecured connections, providing them access to wherever you navigate to on your mobile devices, including the company network. Hackers can also take advantage of devices trying to connect to public WiFi, creating fake points of connection and demanding an account for access. Users often create a login and email that mirrors two-factor authentication of their email and other private networks, allowing hackers access to significant amounts of data. Businesses must prioritize a private mobile network to accompany their employees’ mobile devices and encourage smart mobile practices.

Please select this link to read the complete blog post from thinkCSC.

Printer-Friendly Version