Business Bytes Newsletter
May 2013 :: Issue No. 10
Greetings <<First Name>>,
As corporate mobile devices (tablets and smartphones) become a staple of the modern-day workplace, the risk of critical information winding up in the wrong hands increases. It takes a seasoned cyber-criminal a matter of minutes to crack a four digit smartphone password. Given the lag time between when an employee realizes a theft and reports it to the IT department to take preventative measures, cyber-criminals may have up to several hours to snip business data, corporate contacts, read private emails, and even hack into social media accounts. While mobility makes life easier, it also heightens security risks. 
The tremendous popularity of mobile devices has created new opportunities and challenges for organizations. Employees are increasingly demanding that they be allowed to check their email, run business applications and access data from their own devices -- a trend known as bring your own device, or BYOD. For the small and midsize business, there are many benefits to allowing employees to do just this: Users can work even when they're not in the office and using IT-assigned equipment. Sales agents in the field can use personal smartphones to process credit card payments. Remote employees can access information when connected to a different network. The business owner can respond to email queries from customers after hours. For small and midsize businesses, the shift to using personal devices can have a tremendously positive impact on productivity. However, along with benefits come security concerns and risks, and SMBs typically have fewer resources and more limited budgets than bigger companies do for dealing with such issues.
SOLUTION: Managing Mobile Security

Most discussions about mobile security tend to focus on smartphones and tablets, but they aren't the only dangers facing businesses. In fact, in environments where smartphones and tablets are not supported, the business still has to have a comprehensive mobile security strategy in place to ensure that employees aren't just walking around with sensitive data stored on unsecured USB drives or inserting infected drives into the network. The easiest way to secure these devices is to provide employees with encrypted USB drives. The business has to make it clear to employees that if they need to copy data to a removable drive, the drive must be encrypted. If such a device is then lost or stolen, the data it contains will be of no use to anyone who finds it. Indeed, being clear with employees and providing concrete policies are key to any mobile security initiative. Managing mobile security begins with an acceptable-use policy that spells out how personal devices can be utilized on the company's network. The policy should cover access and security elements, experts say. Access rules define what resources or applications are available from the mobile device. Security elements touch on the use of antivirus programs, encrypted drives and mobile management apps.

 Hot  Off The Press
New Updates
  • Having installation troubles? Contact Us
  •  Spread the Word: New Referral Programs Coming Soon
We have a lot of computers and employees that browse the internet, GNS helped provide a solution to keep our users protected from internet scum. ~Stephen Tennison, Ashford Court Apartments
Gary's Guide
“Ever wondered why cyber-criminals do what they do (besides waking up every morning and deciding to be jerks)? The money is the motivation.” ~G
This email was sent to <<Email Address>> You are receiving this email because you recently purchased a product/products from one of our sales representatives. As a premier client you are presented with the opportunity to learn about new products, special services, offers, product promotions, giveaways, and more. If you feel you have received this email in error, click on the link to unsubscribe from our list. Our apologies.
Guardian Network Solutions 4524 Boat Club Rd Suite 174 Fort Worth, TX 76135 USA