One Crucial Step To Include In Your Cyber Security Policy

Mobile + Cyber Security Dale Sutherland todayJanuary 29, 2020 251 5

Background
share close

Encryption on both computers and mobile devices in your business is a crucial step to securing not only your technology but also the data contained in your business.

In this article, we are going to highlight some of the basic steps of implementing encryption across your company. As a bonus, we will also disclose an efficiency tip to preform device encryption with just two clicks of the mouse.

Laptops & Computers

Most modern Microsoft Windows bases systems have an inbuilt feature called BitLocker. This service allows you to encrypt the whole storage area of your system. However, this depends on your version of Windows and by default this service many not be enabled. Please seek seek professional advice if help is required.

We’ve seen too many times businesses enabling BitLocker and losing access to their computer systems.

Any professional IT services firm will implement BitLocker device encryption system-wide using either a remote management software or using windows server-level BitLocker encryption policy.

Mobile Devices

Many mobiles and smartphones now come with encryption as standard however this is not always the case. Furthermore, some devices don’t require any form of security access. You can easily disable the lock screen and security pin code on a mobile device.

This is why we always suggest you implement mobile device management (MDM) on company devices.

With only a couple of clicks once the MDM software is installed, an IT professional can easily enforce security on all enrolled devices, this includes encryption, strong passcodes and fingerprint ID where necessary.

As a bonus, the MDM software also allows you to deploy new business apps without the need for performing a manual install on each device separately.

Other Devices

So far in this article we have covered both desktops, laptops and mobile devices, but what about other forms of devices that might hold valuable company data? What do you do with them?

The most common device that comes to mind is the USB key. These are extremely handy and practical for many purposes but the disadvantage to these devices is that they can easily be lost or get into the wrong hands.

Many organisations outlaw USB storage device completely and block the use of them on their systems as they can also be used to transport viruses. However, not everyone wants to give them up that easily and we always suggest purchasing USB storage devices with some form of encryption on them.

Many devices now come with software encryption when you plug them into your system. If so, you’ll be asked for the password before you can open the files. Some devices even have a pin keypad physically on the device.

No matter what the choice is, it’s worth encrypting the data that ends up on these devices.

If you would like to find out more about how you can protect your company data please get in touch with our expert team at Aberdeen Cyber Security.

Written by: Dale Sutherland

Tagged as: , , , , , , , , , , , , , , , , , , .

Rate it
Previous post

Similar posts

Aberdeen Cyber Sercurity Logo
  • 214 Union Street, Aberdeen, AB10 1TL
  • 01224 545775
  • Send Mail

Follow us

Aberdeen Cyber Security - Cyber Essentials