Business Solutions Center
Security Center

Home Resources Security Center Using Mobile and Handheld Devices Securely

Using Mobile and Handheld Devices Securely

Using Mobile and Handheld Devices Securely

Small businesses often use mobile devices like cell phones and tablets to conduct business. Nowadays many handheld devices have WiFi or wireless connectivity. Of course with these devices comes a new, sometimes unique set of security risks. That’s why it’s important to consider the safety of your information on all of the devices used by you and your associates.

Here are some for using all kinds of mobile and handheld devices safely:

  • Physically protect devices. One of the worst-case scenarios is that someone steals a device altogether and has access to all of the information on it. Be mindful of the whereabouts of all of your devices. Carrying them in a holster or the same place all the time can help.
  • If available, register for a service like Apple's "Find My iPhone" that lets you lock, track, and erase devices. If a device does get into the wrong hands, this can save you a lot of additional problems.  
  • Use the auto-lock and password features. If you do leave your device unattended, an automatic lock can protect you. Setting it to lock after a few minutes is advisable.
  • Keep the system and software up to date. Updates often fix known security issues, so not updating can leave you vulnerable.
  • Turn devices and accessories off when they're not in use. Bluetooth is a great example of a technology that is better left off when not in use.
  • Use the location feature sparingly. If an application asks for access to the GPS system on your device, considered whether it's really necessary for the application to do what you need it to. If not, deny the request.
  • Use "bumping" wisely. If you're going to transfer information from your device to someone else's, make sure you understand the technology first. Know what information will be shared and what security measures are taken.
  • Don't use a charger that doesn't belong to you. Cables used for charging look simple enough, but they can actually be modified with microcomputers that can grab information.
  • Dispose of devices properly. In order to make sure that no information on the device can be recovered, you'll need to completely clear the device.

The rewards of using mobile and handheld devices can be great, just make sure they are not overshadowed by the risks by using these devices as safely as possible.

The information included on this website is designed for informational purposes only. It is not legal, tax, financial, or any other sort of advice; nor is it a substitute for such advice. The information on this site may not apply to your specific situation. We have tried to make sure the information is accurate, but it could be outdated or even inaccurate, in parts. It is the reader's responsibility to comply with any applicable local, state, or federal regulations, and to make their own decisions about how to operate their business. Nationwide Mutual Insurance Company, its affiliates, and their employees make no warranties about the information, no guarantee of results, and assume no liability in connection with the information provided.