Safe to Move About the Office: Mobile Security in the Workplace

By Bruce Harmon, Ph.D., University Program Director of Computer Science

CTU Computer Science - Mobile device securityWorking at home and on-the-go is easier than ever thanks to mobile devices like smartphones, computer tablets and laptops. Even at work, professionals use mobile devices to make work easier and more accessible.

Although mobile devices give professionals more freedom, they come with greater risks than desktop technology. Mobile devices are easier to lose or steal, certainly. They can also easily copy confidential data. That data can be vulnerable when the mobile device connects to an unsecured wireless network or downloads mobile malware.

So how do information technology professionals address the security risks involved with mobile technology? Here are some strategies they use to keep company data secure.

Requiring Passwords

Making sure your phone or tablet locks with a password is the most basic – and obvious – step to take to keep your device secure. Although you might not opt to use a password on your phone, you may not have a choice if your workplace has a BYOD, or “bring your own device,” policy. IT administrators often require employees to use passcodes on their personal or work-issued phones. This measure protects confidential information such as can be found in work email in case a phone falls into the wrong hands.

Limiting Local Data

A good way to keep confidential data safe is to limit or regulate what users can store on their mobile device. Instead of keeping files on the device, users can access data on a remote server. IT professionals require employees to log in to view their files on the server, protecting the data from unauthorized users.

Downloading Security Applications

IT administrators sometimes create policies that require employees to install security applications on their devices. Usually, one of these applications is anti-virus software to protect the device from mobile malware. An application often put on BYOD phones allows the company to remotely wipe all of the data off the phone in case it is lost or stolen.

Take measures to improve security on your mobile devices by doing the following:

• Protect your data by using a password on all of your devices
• Don’t respond to text messages from unknown numbers
• Download apps directly from iTunes or Google Play to avoid malware
• Set your firewall to deny all incoming connections, especially when you’re connected to a public wireless network

Protecting devices takes a few smart moves before you can rest easier. Safeguard your mobile assets, and be safe to move about the office.

CTU Faculty - Bruce HarmonBruce Harmon, Ph.D., is the university program director of Computer Science at Colorado Technical University. He earned a Ph.D. in Electrical Engineering with a minor in Computer Science from the University of Colorado and an M.S. in Aeronautical Engineering from Purdue University. He earned a B.S. in Aeronautical Engineering at the United States Air Force Academy. After nine years in the Air Force, he worked in defense and later at top-tier commercial companies for 17 years both in research and executive leadership positions. Learn why he’s IN. 

Stay in the know. Subscribe to CTU’s blog and receive fresh updates directly to your inbox.

Image credit: Flicker/IntelFreePress

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us

 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×