The harmful computing practices in enterprise

07th of June 2021

Smartphones and tablets have made their entry into many companies’ daily life more than a decade ago. However, a huge part of enterprises are not careful enough about professional data that might transfer from a device to another. Indeed, in 2021, some users still have harmful computing practice habits that can be a danger for professional data security. Here is a non-exhaustive list, associated with good practices allowing to avoid them.

Not securing smartphones with a password

According to the Kaspersky Lab report, in 2018, nearly 52% of respondents didn’t protect their smartphones with a password. This bad practice is still too important today, even with devices in contact with sensitive data: personal but also professional ones. With the development of BYOD, enterprises must be careful and require at least a password protection to restrain devices’ access. However, without a strong MDM solution, it is hard to force users to put passwords on their own devices.

Accidentally installing malicious applications

Users of smartphones and tablets have access to millions of applications through their devices applications market, such as the Playstore or the Apple Store. Nonetheless, among all of them, an important number are dangerous and can steal company’s data. As reported by The Invisible Digital Threat report from Secure-D, in the 2020’s first quarter, 29 000 malwares applications were available on the Android market.

Not restraining information access

Companies are paying attention to external data coming from a competitor for example but don’t think that attacks could come from the inside. And yet for instance, some mischievous past employees may still have access to professional documents or accounts on their personal smartphone. According to the Global Data Risk report from Varonis, in 2018, 21% of all folders in a company were opened to every employee. Without a mobile device management software installation, a company is not able to restrain professional documents access and delete business data for ex-employees.

Not blocking connectivity points

Except for secured WiFi networks such as the company or home ones, many people use unsecured public WiFi (not protected by a password) without any particular caution. This behaviour can push the installation of malwares on the devices. Still regarding the connectivity points, connecting its mobile device to a computer via a USB cable also increases data theft if one of them is infected by a virus.

How to increase the securing of devices having access to professional data ?

All those bad practices can easily ruin a company’s computing security and create data leakages. To avoid them, setting up a mobile device management system is essential.

An MDM solution like TinyMDM enables businesses to solve the problems listed above. Indeed, this software allows to force a password on professional mobiles but also to block access to business data on personal devices with the installation of a work profile. As well, the Android mobile device management solution enables to precisely define the applications that will be visible on the smartphones, tablets or rugged devices and to block access to the public Play Store. Among the other features, we can find the professional files synchronization, which might be restricted to specific devices only.

Many bad practices are still affecting professional data security, particularly in SMEs (as said in the Data Breach Investigations report from 2018, 58% of data hacking involves small and medium businesses). It is impossible today for a company to know exactly what data is stored and shared on personal devices of its employees, for private policy reasons. However, an enterprise can protect professional dedicated devices and also restrain access to corporate information on private smartphones or tablets, by using a reliable MDM solution.

Simple Android Mobile Device Management solution

Keep a complete control over your entire professional fleet.
Connectivity management
Remote wipe
Physical tracking
Remote control
BYOD mode
Kiosk mode
Internet filtering
Screen control
Block settings
App restrictions
Files sharing

30 day free trial period

All features available