KIA&B 2015 Volume 20, Issue 2 | Page 7

for years allowed Blackberry-based access to email and other company systems, users are now demanding that iPhone/Android-based smartphones and tablet computers be provided access to these same services. how do you proceed? If allowing employees to use their own mobile devices, consider the following security measures: 1. Require a strong phone startup PIN which is at least 6 to 8 characters long or the maximum allowed. Reduce the PIN required timeout setting to no longer than 10 minutes. 2. Require specified encryption and anti-malware software on each device. 3. Require and install mobile tracking software which allow online access to track the location of a lost/stolen phone and the ability to perform a lock and/or remote data wipe. Secure the employee’s authorization to take these actions on the device if the device is misplaced, lost or stolen, as a condition of giving access to the business’ systems and data. 4. Do not allow broken, rooted or jailbroken devices on your network. These phones have removed limitations installed on the phone by the carrier allowing the user to run apps and files not approved by carriers. This process opens the device up to security risks. 5. Large enterprises monitoring multiple devices should consider Mobile Device Management (MDM) software. MDM software centrally controls and protects the data and configuration settings for all mobile devices in the network. MDM can also provide a secure document delivery platform and end-to-end data transmission encryption. The opportunities of BYOD are present and here to stay. As an analogy, home security is more complex for a bigger house with more entrances and windows. So too is systems security when smartphones and other remote devices present new entry points to be analyzed and protected. All of the security tips presented here are guidelines to aid agencies in diminishing security and privacy risks and managing them. The Agents Council for Technology (ACT) is designed to provide technology information for independent agents. ACT is a partnership of agents, companies, technology vendors and associations dedicated to enhancing the use of technology and improved work flows within the Independent Agency System. Its major areas of focus are agent and agent-carrier productivity, Internet marketing and agency security, as well as understanding trends that will drive consumer expectations and business opportunities. Please judge us by the company we keep! Berkshire Hathaway Group We are proud of our parentage (and our cousins!) and strive to live up to the family name. To learn more about agency appointments with us, go to: www.guard.com/apply Berkshire Hathaway GUARD Insurance Companies Featuring One-Stop Insurance Shopping for Small- to Mid-Sized Businesses We write Workers' Compensation policies nationwide and make available complementary Businessowner's Policy, Commercial Umbrella, Commercial Auto, and Disability coverages in select states. We pride ourselves on our easy submission process; competitive pricing; fast, fair claims handling; cash-flow friendly payment terms; and superior customer services. |March-April 2015| KANSAS INSURANCE AGENT & BROKER 5