Bookmark and Share
managed service provider virginia pronets in galax, virginia va   managed service provider virginia pronets in galax, virginia va
managed service provider virginia pronets in galax, virginia va
 
 
 
managed service provider virginia pronets in galax, virginia va   managed service provider virginia pronets in galax, virginia va
 
Search
Case Studies
Client Testimonials
Blog
FAQ's
News
Newsletter Signup
Newsletter Archives
Network Health Checkup
Checklist for Health Checkup
Choosing an IT Company
 
  managed service provider virginia pronets in galax, virginia va  
 
 
   

June 11 - Tech Tip Print E-mail
Tuesday, 11 June 2013 09:21

How many of your employees are accessing your network with their phone? Most companies do not have the answer to this question readily available and often under guess.

So before we get into all of the details on how to know, support, and defend those Bring Your Own Devices (BYOD) let’s get into the basics.

Here are the risks when you add a cell phone or tablet to the network:

  • Theft or loss: Mobile phones, smart phones (phones that support email, documents, and applications) and tablets (such as iPads) are getting fancier and more popular all the time. This makes them a target for theft -- hundreds of thousands of mobile devices are reported lost or stolen each year. A thief could use your wireless access, steal your identity and credit card information, or cause you to pay for a new phone and unauthorized charges on your bill.
  • Viruses: These devices are becoming more susceptible to hacks. Attackers exploiting vulnerabilities in the software, by writing viruses and other malware for phones and tablets, can disable your device or expose the data stored on it.
  • Loopholes in cell phone company security: Some phone companies store your data on their server. Do you trust your phone company to keep your data secure? Phones may not be the best place to store valuable or personal information.
  • Privacy: Phone conversations can easily be overheard. Passwords, credit card numbers and other identifiable information may be best discussed in a private place.
  • Bluetooth problems: If Bluetooth settings are not correctly configured an attacker can retrieve address book, call history and other information from a target phone, or send a virus over a Bluetooth connection. To avoid these problems, simply disable the Bluetooth component until you need it.

Begin to think about the exposure these devices add to your network and I’ll teach you some tricks to tighten up the security surrounding these risks.

 

 

 

 

 


About Pronets | Contact Us | Services | Client Support Center | Sitemap | Home | Email AUP

© 1998 - 2017 Professional Networks, Inc. (Pronets) • 307 Meadow Street • PO Box 389 • Galax, Virginia (VA) 24333
Email Address: info@pronetsinc.comPhone: 276-236-8226 • Fax: 276-236-7446
Website Designed and Hosted by Professional Networks, Inc.