The National Cybersecurity Awareness Month (NCSAM), which is every October, has been reminding everyone the importance of the security of IT. The theme of this year is “#BeCyberSmart, Do Your Part.” The main focus here is the protection of the device.
The security of anything within connection to the internet could possibly be hacked, and especially since more devices are connected to the business networks at all times.
Mobile devices, computers, and Internet of Things (IoT) devices are network endpoints that need proper security to keep personal data safe.
Attacks of malware on IoT have jumped to over 55% within the beginning 2 quarters of 2019 and jumped to over 215% in the year preceding, according to copperbandtech. It’s unfortunate knowing that not all devices receive the same attention to their security.
Mobile and IoT devices have often been lagging behind at strategies for cybersecurity in a business of Tennessee. Although, mobile devices have recently been making up the endpoints by 60% of an office more than computers. It could mean a scarier threat towards security if not addressed properly.
Here’s a list of how to keep the devices secure within the network, may it be computers, routers, or the mobile devices of employees.
Mobile devices, computers, and IoT devices each have OS (operating systems) and software which needs regular updating. The updates have included vital patches for security, which are released by the manufactures in fixing vulnerabilities in the newly found code. These vulnerabilities could allow hackers in breaching the device.
There are three main update types for device:
- Update for OS
- Update for app/software
- Update for firmware (updates software which runs the hardware)
Sadly, not many of the updates send alert messages on the computer. Updates of firmware on the computers and IoT devices are not so obvious, and proper inspection into the settings of the device has been needed to find them.
One of the many easy ways in ensuring the updates of the device have been applied regularly would be to have them done via a managed service plan.
Use Screen Locks and Strong Passwords
Laptops and mobile devices are more easy to get lost or get stolen in comparison to other devices. Wearables such as an Apple Watch have fallen into the same category. Making difficulty for anyone trying to access the data within the device has been what’s wanted.
Strong passwords and screen locks are necessary for the security of devices. If left or made accessible, anybody could access the accounts that are signed in, even the online wallets in the mobile device, and many more.
Use an Endpoint Device Manager
Approximately around 78% of the businesses have a BYOD (bring your own device) policy as far as the usage of mobile devices during work. Having the employees to use their personal smartphones for work saves a lot of money for the companies and makes things more convenient to the employees. Although, it has a security risk if which devices are accessing the business data and cloud accounts are not kept track of at all.
An endpoint device manager, such as Microsoft Intune, could support the security of all the BYOD endpoints despite wherever they are, along with employee computers and laptops used by the work-from-home employees.
Some of the standard features in the endpoint device manager included are:
- Remotely revoke or grant access to the assets of the business
- Detect a connection attempt from an unknown device
- Remotely swipe or lock the business info. from devices
- Automatically update softwares
Use a Strong Anti-Malware/Anti-virus
Despite most of the computer users know the need of having installed an anti-virus program to support the prevention of malware infections, not everyone realizes that even the mobile devices need anti-virus as well.
Mobile devices have been attacked much more since they hold access to data, such as banking activities and other very sensitive information. Antivirus protection deems important for the safety of mobile devices from mobile malware and malicious apps.
Switch IoT Device Logins
IoT devices are usually breached by using the default-manufacturer logins which users have not changed yet. These logins only assist in setting up a new IP security camera, router, or some other IoT devices, although they should immediately be changed during or after setup.
Another thing which makes things easier for hackers happens to be the usage of SSID (name of device on the network) by users. It describes the brand and model of the device. This information gives the hacker an easier time to pick the manufacturer passwords for trial.
It’s very important to understand that even IoT devices, despite might not be holding sensitive data, are gateways into the network and into the other devices if not secured properly. Switch the IoT device logins from default of the initial setup to a non-descriptive name for the device.