Bookmark and Share Email this page Email Print this page Print Pin It
Feed Feed

Cyber security and smartphones a smart play

iStock

(page 1 of 2)

For all business operations, having the right security solutions in place is more important than ever. According to the National Cyber Security Alliance, 50% of small businesses have experienced a cyber attack, and 60% of both small and medium sized businesses that have been attacked will go out of business within six months of experiencing a cyber attack. Since data usage has become an important part of consumers’ daily lives, it has become a trend to offer to an unlimited data plan.

Smartphones, the internet of things, and mobile apps make it easy and cost effective to set up a “smart business,” but they can make new ventures more vulnerable, as well. Fortunately, small businesses can use wireless technology solutions to enhance security. We recently spoke to Andy Schlingman, who is responsible for business development in the state of Wisconsin for U.S. Cellular, and we promise no sales pitches while he explains how most carriers approach security. As he explains, “The small business owner has a lot of options they are probably not aware of.”

IB: Let’s stipulate at the beginning that consumers and businessmen and women love their smartphones, but let’s also begin by talking about how vulnerable their smartphones, and the mobile apps contained within, are to cyber attacks. How would you describe that level of vulnerability, especially for employers whose employees use a company phone?

Andy Schlingman

Schlingman: “Cyber attacks are becoming more and more prevalent, not only across smartphones in the wireless industry but also across the entire internet, and because smartphones are basically an attachment or an extension of the internet, they are becoming more and more vulnerable. That’s why it’s important to utilize solutions like a mobile device management program.

“What that does is it really takes your smartphone and locks it down from a company standpoint. So when you’re looking at security, the pieces of security that are out there, one of them is protecting company information. And protecting it not only from cyber attacks, but also from employees taking company-owned equipment and going to websites they shouldn’t be going to and doing things with that phone that aren’t business related.

“So, if you’re using a mobile device management program, what you can do is control what that smartphone can do. Not only that, if it gets lost, you can wipe it out so that you’re protecting company information, not only from other people getting a hold of it, but also from having the devise going to internet sites that may be vulnerable to cyber attacks.”

IB: Is a mobile device management program an approach just about every carrier uses, or do different carriers try to attack security differently?

Schlingman: “Security is really broken down into three basic categories: monitoring — people, places, and things; fleet management and asset tracking; and protecting company information.

“Monitoring would involve sensors, cameras, and wireless devices that would allow the end user to manage their business remotely. Examples are sensors to monitor temperature and water levels in the agricultural space in order to optimize crop growth, cameras at remote locations in order to monitor the space, and sensors on doors within facilities to ensure that buildings remain closed, locked, and secure — all of which can be accessed from a wireless device.

“With fleet management and asset tracking, the government has mandated that the trucking industry provide electronic logging of their activities directly from the trucks’ engine and diagnostic ports versus the old, self-reported logbooks. Solutions allow customers with fleets of vehicles to track not only their whereabouts, but also monitor the maintenance schedules of the vehicles. We can also install routers in heavy assets such as front-end loaders and bulldozers to ensure the customer knows where they are at all times and decrease the risk of theft.

“Protecting company information comes in the form of a mobile device management solution. These solutions give the customer control over what content the end user is allowed to have on their company-owned device and control the websites the end users can access in order to stay compliant with company policy and to avoid any unnecessary data charges, as well being able to wipe company information from the device in the event the device is lost, stolen, or the end user has left the company.

“Most wireless carriers will break it down into those categories.”

IB: How would you handle a situation where an employee has his or her own smartphone and uses it for business purposes under someone else’s employ? How does that work in terms of security?

Schlingman: “That’s where we would go back to a mobile device management program. We can ring an employee’s device into an organization and allow them to get to their corporate email and their corporate internet site and lock that side of it down. We can sandbox it out where this is your corporate information and then this is your personal information. By using a mobile device management system, you can separate the two.

“What that allows you to do is protect the company information without really touching the personal information. If the phone gets lost or that employee leaves, you want to be able to take the corporate email off that device and take the access to corporate information off that device, but you don’t want to wipe out their pictures and their personal information.”

(Continued)

Add your comment:
Bookmark and Share Email this page Email Print this page Print Pin It
Feed Feed
Edit ModuleEdit ModuleShow Tags

Events Calendar

Edit ModuleEdit Module
Edit Module