What suggestions do you have for managing the mobile devices in our business?
This question was answered on October 12, 2017. Much of the information contained herein may have changed since posting.
It’s no secret that more business is being done on mobile devices then ever before, as mobile Internet access surpassed desktop usage for the first time back in November of 2016.
Since these devices have become so invaluable for conducting business, every business should be thinking about how to manage them.
Single Biggest Risk
The likelihood of a mobile device being lost or stolen is exponentially higher than a desktop computer, so planning for this eventuality is critical.
Since passwords and access codes are commonly stored in browsers and apps, anyone that gets their hands on an unprotected mobile device can instantly assume the identity of the victim and wreak major havoc.
Computers, tablets and smartphones that don’t require a password or passcode in order to use them should be strictly prohibited in any business.
Basic Protection Layers
Even with an access password enabled, a motivated thief can make their way to your sensitive data, so using some form of encryption and installing a remote tracking program provides additional layers of protection.
Apple devices running iOS 8 or higher are encrypted by default and Android users can search for ‘encryption’ in their Settings menu to activate it.
While both Apple and Google offer free tools that will allow you to track, lock down and remotely erase lost devices, they lack some of the more useful features available in third-party options.
Pictures Can Help Recovery
One of my long-standing favorites is Prey from https://PreyProject.com because it adds the ability to take screen shots on laptops as well as take pictures of the user from the camera(s) on any of your mobile devices.
This can become critical, because simply determining the general location of a device isn’t much help if it’s a huge apartment complex or a 20 story commercial building. Your chances of getting any type of help from law enforcement goes up if you can provide more than just location information.
The free version of Prey covers up to 3 devices, but no longer includes the ability to remotely erase your data. You can either opt for their $5 a month package for that feature or use Prey along with the free tools offered by Apple or Google.
Large Scale Systems
If you have a large number of devices to manage, you’ll want a more sophisticated platform. Prey offers customized business packages, but for a much more comprehensive set of tools, look to solutions such as AirWatch from VMware (https://goo.gl/4Fw6gM), Meraki from Cisco (https://goo.gl/V1g2Tw) or Intune from Microsoft (https://goo.gl/8gXQqt).
These tools dramatically expand your management capabilities to include limiting the mobile devices that can connect to your network, controlling what data those devices have access to and various tools that makes deploying and managing a large number of devices much more efficient.
These more sophisticated tools allow IT managers to better control what can be done when an employee is using their personal device for business without restricting their personal needs.
The cost of these more sophisticated tools can range from a per device charge (starting @$2.50 a month for AirWatch Express https://goo.gl/RUxP35) to a per user charge used by Microsoft.
About the author
Posted by Ken Colburn of Data Doctors on October 12, 2017