Tips to Increase Your Smartphone Security

John Biglin, CEO | August 7, 2014

Your entire address book, calendar, personal files, photos, and other sensitive information is compressed into one handheld device: your smartphone. Sure, you’ve taken proper precautions to encrypt your company data, setup disaster recovery, and even migrate your files into the cloud. But, how secure is your smartphone? These tips will help keep your handset secure and your information private.

  • Create a lock code. To increase the security of your smartphone, set a lock code. You can create a 4-digit PIN or an actual password with a mix of letters, numbers, and characters. Ideally, you should set your smartphone to require this code every time you wake it for use rather than setting adelay of 1 or 5 minutes before passcode entry is required.
  • Enable “Do Not Track.” Every website you surf on your mobile device collects information, or data points, to better tailor advertisements to you. By enabling “Do Not Track” on your mobile web browser, you are telling these websites to not collect any information. While enabling this function does not guarantee your data will not be collected, it does significantly limit the amount. Android users can enable this setting on their Google Chrome browser and iOS users can set this up on their Safari browser.
  • Get familiar with Recovery Apps. It is inevitable. At some point you will misplace your phone. However, now you can track it down when it’s not where you left it. Both Android and iOS offer recovery apps that allow you to track your phone down via GPS location and also lock it just in case in falls into the wrong hands. You also have the ability to completely wipe all data from the phone if you fear that it may be in the wrong hands, or that you may never recover the device.
  • Keep your device physically secure. While you protect your data from websites and businesses, you may be leaving your phone susceptible to the old fashioned snatch-and-grab. Keep your phone in a hard to access place such as in a tight front pocket. It is not a good idea to leave your phone unattended on your office desk, within your car, or on a counter at a department store or coffee shop. Thieves merely need a few seconds to steal your device.

Be Aware of New Google Calendar Scams

If you think that you can easily decipher phishing emails and other sophisticated scams, you might be wrong. New cyber security research shows that scammers are becoming increasingly sophisticated with their ploys by utilizing the integration between Google Calendar,...

read more

Customer story: Chesterfield County

Watch how Virginia's Chesterfield County Department of Social Services recently transformed its outdated workplace using cloud technology. Using Microsoft Dynamics 365, the department streamlined manual processes and siloed data to improve efficiency and productivity...

read more

Protect your data in files, apps, and devices, within and across an organization

Mobility has become a staple of the modern workplace, offering flexibility to employees and greater productivity to employers. However, this flexibility often requires that employees use their own devices to work when out of office. So how can you protect your data without losing the benefits of “bring your own device?”

Tools such as Azure Active Directory and Microsoft Intune can help you manage access to your data and company networks without invading employee privacy.

At Interphase Systems, Inc., we want you to get the most out of what technology has to offer. Contact us to learn more.

read more

Customer Story: BP deploys Microsoft 365 to improve user experience and security

In an ever-changing security landscape, how do you keep users, devices, and data across 80 countries protected? For BP, they use Windows Defender Advanced Threat Protection that can compile information and identify possible threats more effectively than ever before. So effective in fact, that they put it on all 30,000 Windows 10 devices they have deployed across the world.

And this is just one of the many security tools from Microsoft 365 Enterprise E5 that BP is relying on to remain secure as they continue to transform their company.

You don’t need to be a company the size of BP to take advantage of the same security tools and capabilities BP has implemented to secure the modern workplace.

Are you ready to transform your organization? Interphase Systems has the team, the process and the tools to get you there. Learn more about BP’s security journey in this video, and contact Interphase Systems to help you secure your organization’s information.

read more

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

A truly comprehensive security system does more than just provide “locks” for the entrances to a network, it searches for and reacts to threats that may have already entered the system.

The Advanced Threat Protection integrated throughout Microsoft 365 monitors and protects everything from data, to endpoints, to user identities. These tools are always working behind the scenes to keep your business secure, keeping you in the loop without overwhelming you with information.

At Interphase Systems, Inc., we believe in securing your business with a holistic strategy. Contact us to learn more.

read more