Skip to the main content.

If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen.

<img src="" align="right" alt="Mobile Security" width="200"When your smartphone is synched to your firms cloud data, there might be more than personal information at risk. The good news is, setting your device security do not have to be difficult. The process is fairly simple and straightforward, given that your systems use up-to-date technology.

Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data.

Here are possible minimum requirements every firm system must have:

  • PIN required to access phone- a 4-digit minimum must be required, but the longer the PIN, the more secure it will be.
  • PIN timeout- It’s important to have a maximum idle time a PIN is allowed to be used. This is to ensure that the device is not left unattended, or in the case that it is, unwated onlookers might not be able to access the firm’s information. Allowable can be 0-60 minutes. 0 means a PIN must be entered every time a phone is turned on.
  • Failed login attempts before wipe: Maximum attempts to enter PIN must also be implemented. This can go from 4 to 16 attempts. This means that after 16 failed attempts to enter the correct PIN, the phone will automatically be wiped of data and reset to factory default settings.
  • Encryption- Enable encryption on storage card if the option is available.
  • If you do not have these steps employed yet, here are some recommendations to consider for maximum information security:

    1. First, you must inform the employees of the importance and urgency of the changes you’re going to implement. You can have everyone sign a mobile device security policy ensure that the protocols are observed.
    2. Have the phones and devices updated to meet the necessary requirements of update. For encryption, all iPhones running on iOS7 and up are encrypted by default. Android phones have no problem with encryption settings.
    3. When you have secured that the phones meet the minimum requirements, it’s time to move to updating the Exchange Server. Individual difference in PIN and PIN timeout cause varying security level, but the Exchange Server will impose a fixed minimum security setting that employees cannot alter.

    There are also available third-party options like Good Technology and MaaS360. They can be used for separating firm and personal data. This comes especially helpful to those who have a BYOD (Bring Your Own Device) policy. However, this can also pose as a challenge as it requires the use of “firm apps” to access emails, contacts, and calendars that do not work as seamlessly as native applications.

    Thinking about a BYOD policy in your {city} business? We can help.  {company} works with my businesses across {city} to help ensure their mobile computing is very secure. Have questions?  Give us a call at {phone} or email us at {email}.

    Can Just ONE Person Meet ALL of Your IT Support Objectives AND Stay Within Your Budget?

    Can Just ONE Person Meet ALL of Your IT Support Objectives AND Stay Within Your Budget?

    A discussion of how to meet all of your objectives and stay within your budget at the exact same time when it comes to IT.

    Read More
    New Ruling is a HUGE Step for Your Privacy Rights – You Can Ask Google to Remove Search Results About Yourself!

    New Ruling is a HUGE Step for Your Privacy Rights – You Can Ask Google to Remove Search Results About Yourself!

    Have you ever looked up your name in a search engine and found something embarrassing or upsetting? As of May 13th, 2014, you’re able to request to...

    Read More

    On Time Tech – Your Strategic IT Business Partner You Can Always Rely On

    Contact us at {phone} or email us at {email}. {company} will become your strategic business partner and trusted advisor today to help your business...

    Read More