{"id":2437,"date":"2014-01-23T08:00:15","date_gmt":"2014-01-23T16:00:15","guid":{"rendered":"http:\/\/clikcloud.net\/dna\/mobile-security-care\/"},"modified":"2014-01-23T08:00:15","modified_gmt":"2014-01-23T16:00:15","slug":"mobile-security-care","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/","title":{"rendered":"Mobile Security: Why Should I Care?"},"content":{"rendered":"<h1><span style=\"font-size: 13px;line-height: 19px\">Mobile security is top of mind when it comes to concerns for IT Managers. \u00a0According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops. \u00a0\u00a0It is no surprise that mobile devices are the target of mobile security threats.<\/span><\/h1>\n<p dir=\"ltr\">Chances are most people in your company have a smartphone, tablet or both. \u00a0In some cases these devices connect to your company network using WiFi. \u00a0It is equally likely that these devices access company information via email, mobile applications or file synch to company data. \u00a0Now that these devices are universal, it is important to have a plan if they are lost or stolen. Keep in mind, your four digit password may be the only thing between an intruder and your data. \u00a0Here are some additional considerations for mobile security.<\/p>\n<h2>Mobile Security Policy<\/h2>\n<p dir=\"ltr\">While you can remotely wipe a Mobile devices when it is lost or stolen, this may not be enough. \u00a0That four digit passcode can be easily hacked in minutes. \u00a0It is important that employees know how to report a lost or stolen device immediately. \u00a0Also consider, there may be personal information on the device that is property of your employee. \u00a0This data may not be backed up and could be impossible to recover. There may be local laws that prevent you from wiping this type of data from personal devices. \u00a0If your employees access your corporate systems, be sure they sign and acknowledge your company policy for acceptable use, including policy for reporting lost or stolen devices and mobile device policy for storage of personal data on a company owned mobile device.<\/p>\n<h2>Mobile Security Training<\/h2>\n<p dir=\"ltr\">Some social networks are designed to harvest contact information that may be synched with corporate contacts. \u00a0Publishing privacy data without consent may be considered a data breach. \u00a0Train your employees on the importance of mobile security policy and the related mobile security risks.<\/p>\n<p>In addition to mobile anti-virus, mobile anti-malware detection, device management, mobile phishing protection, your knowledgeable employees are one of your first lines of defense against the threat of a mobile security breach. \u00a0If you feel your employees need training or your mobile security policy is not up to date, contact your mobile security professional today!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile security is top of mind when it comes to concerns for IT Managers.  According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops.   It is no surprise that mobile devices are the target of mobile security threats.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6],"tags":[8,9,14,25,36,37,40,47,50,51,52,53],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Security: Why Should I Care?<\/title>\n<meta name=\"description\" content=\"Mobile security is top of mind when it comes to concerns for IT Managers. According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops.  It is no surprise that mobile devices are the target of mobile security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zorro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/\",\"name\":\"Mobile Security: Why Should I Care?\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2014-01-23T16:00:15+00:00\",\"dateModified\":\"2014-01-23T16:00:15+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\"},\"description\":\"Mobile security is top of mind when it comes to concerns for IT Managers. According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops. It is no surprise that mobile devices are the target of mobile security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security: Why Should I Care?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\",\"name\":\"zorro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"caption\":\"zorro\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Security: Why Should I Care?","description":"Mobile security is top of mind when it comes to concerns for IT Managers. According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops.  It is no surprise that mobile devices are the target of mobile security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/","twitter_misc":{"Written by":"zorro","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/","url":"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/","name":"Mobile Security: Why Should I Care?","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2014-01-23T16:00:15+00:00","dateModified":"2014-01-23T16:00:15+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942"},"description":"Mobile security is top of mind when it comes to concerns for IT Managers. According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For the first time last year, more smart phones and tablets shipped than PC desktops. It is no surprise that mobile devices are the target of mobile security threats.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/mobile-security-care\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Mobile Security: Why Should I Care?"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942","name":"zorro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","caption":"zorro"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/2437"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=2437"}],"version-history":[{"count":0,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/2437\/revisions"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=2437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=2437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=2437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}