Tips for safeguarding mobile phones, information
by AccountingWEB on
Mobile phones are an essential business tool and, while the technology lets you keep in touch from nearly any location, there are some serious security issues.
As phones and telecom-capable personal digital assistants (PDAs) become increasingly smaller, they have become easier to lose and steal. Moreover, with their growing capabilities for storing personal and business information, they are becoming more desirable for thieves and play a growing role in identity theft.
And it's not just the mobile phone user who loses out. Businesses also suffer.
Employees find themselves without their business contacts – as well as critical and sensitive corporate information – that were stored on the devices. Even more devastating is when an employee's stolen PDA is connected to a company's network, thus compromising vast amounts of data.
Some manufacturers include chips on handheld devices that allow the owner to remotely disable the device if it is lost or stolen. Virtual Private Network software also can be added to PDAs to protect those devices if they fall into the wrong hands.
While mobile phone makers are taking steps to solve the problem, there are security precautions your company can take.
For example, install security features on phones that enable an alarm to be activated if the devices are lost or stolen. You also can set the phones up to show a permanent text in the display area (for example, a name and office phone number).
Stress the importance to staff members of keeping devices and data safe. Bring in a security expert to explain the basics of protecting your assets, and reward employees for compliance when possible.
Additional steps to help prevent theft and improve the chances of recovering phones include:
- Locking the phone with a password.
- Keeping track of where the phone is, never leaving it unattended.
- Reading phone contracts carefully – some contracts provide for specific steps you must take if your phone is stolen.
- Notifying the police immediately so there is a written record of any theft.
- Calling the phone company to report the theft. Make a note of the time of the call, who you talked to and the person's job title. This can help later if the company says the theft wasn't reported and you have thousands of phone charges on your next bill.
- Recording the phone's International Mobile Equipment Identity (IMEI) number. This can assist the police in proving the phone was stolen.
- Activating PIN numbers, which prevent unauthorized calls being made on your phone if it is stolen.
- Marking the phone and the battery with some identifying, but not identity-revealing, text.
Reprinted with permission from BizActions.
You may like these other stories...
Accountants without a succession plan are hurting not only themselves but their clients as well. Here are seven ways to see your practice continues after you retire—some of them are better than others.What Are Your...
In my last article, I discussed the model of value pricing and the benefits this billing structure offers you and your clients. However, in order to set up the right value pricing for your client, you need to know what...
Remember the old joke about the devil showing a guy around Hell? There were great parties, swimming pools, and sumptuous food. The guy liked what he saw, lived a bad life and went to Hell when he died. Upon arrival the devil...
Upcoming CPE Webinars
Excel spreadsheets are often akin to the American Wild West, where users can input anything they want into any worksheet cell. Excel's Data Validation feature allows you to restrict user inputs to selected choices, but there are many nuances to the feature that often trip users up.
In this session we'll discuss the types of technologies and their uses in a small accounting firm office.
This webcast will include discussions of commonly-applicable Clarified Auditing Standards for audits of non-public, non-governmental entities.
In this jam-packed presentation Excel expert David Ringstrom, CPA will give you a crash-course in creating spreadsheet-based dashboards. A dashboard condenses large amounts of data into a compact space, yet enables the end user to easily drill down into details when warranted.