Protect Your Cyber-Security by Properly Protecting Your Endpoint Devices

Good Morning:

Last time we discussed a few of the possibilities abou
t Endpoint Devices. They can be a serious cyber threat if you don't take security seriously enough. Many small business owners are finding out to their own chagrin that this is true.

I realize that these endpoint devices help your business in so many ways. You also have to realize the inherent security problems that can arise by not being careful.

Let's go into it:

Think for a minute about the growing mix of devices your employees use to conduct your business. And think of the many privately owned devices like Smartphones and tablets that they use for your business as well as their own personal use. If you don't see cyber-security problems here you're just not thinking.


These can be among the most difficult assets for your company to manage and protect. How often have you heard of an employee losing their device. Now their personal security is endangered as well as your own.

And what is yours? How about company email messages, video assets, client information, log-ins and access codes that could be potentially exposed. And many of you have all this exposure on employee's personal assets?

Wow! But you're doing this to save a few bucks by using the employees own personal property, right? If this makes sense to you then you need to slow down and think a little more. I am amazed at how often this happens in the business world.

Cyber-security is not something to play at. It's something you live!

But even if you own all your own equipment, it's still not all easy and fun. I realize as a small business person you find yourselves having to keep track of a lot of equipment that cost good money and is occasionally lost anyway. How can you effectively keep track of all this equipment along with personnel that changes with the weather?

There is a solution, but it takes some effort on your part.

One solution is to find a combination of software and equipment that can allow you to not only track, but manage company-affiliated devices, as well as to protect and manage the work information stored on them.

No matter what you decide, cyber-security should be your foremost interest. No exceptions here. Employee owned devices or not, be sure to first check the devices to make sure they have the proper virus protection and that the device can handle any other potential cyber issue, especially if your company has sensitive data on it. You know that this can involve constant software updates, which can be difficult to track over a variety of devices. Absolutely do not fail to put a fail-safe into the device so any data can be wiped clean if the device is lost or stolen.

If you have a staff that is really seriously good with IT, you may be OK. Otherwise expect a nightmare.

I am out of time, but next time let's go into some of the considerations you will have to think on if you want to go with employee-owned devices. I realize that there really are conditions where you might want your employees to use their own electronic devices.

Thank you for coming.

Jim

At [http://www.dynamiccyberservices.com] WE support the courageous few standing up to the purveyors of malware. Those malcontents either make fun of your hard work or wish to make money out of your distress. Stand up for yourselves!



Comments