for years allowed Blackberry-based
access to email and other company
systems, users are now demanding
that iPhone/Android-based
smartphones and tablet computers
be provided access to these same
services.
how do you proceed?
If allowing employees to use their
own mobile devices, consider the
following security measures:
1. Require a strong phone startup
PIN which is at least 6 to 8 characters
long or the maximum allowed.
Reduce the PIN required timeout
setting to no longer than 10 minutes.
2. Require specified encryption and
anti-malware software on each device.
3. Require and install mobile tracking
software which allow online access
to track the location of a lost/stolen
phone and the ability to perform
a lock and/or remote data wipe.
Secure the employee’s authorization
to take these actions on the device if
the device is misplaced, lost or stolen,
as a condition of giving access to the
business’ systems and data.
4. Do not allow broken, rooted or
jailbroken devices on your network.
These phones have removed
limitations installed on the phone
by the carrier allowing the user to
run apps and files not approved
by carriers. This process opens the
device up to security risks.
5. Large enterprises monitoring
multiple devices should consider
Mobile Device Management (MDM)
software. MDM software centrally
controls and protects the data and
configuration settings for all mobile
devices in the network. MDM can
also provide a secure document
delivery platform and end-to-end
data transmission encryption.
The opportunities of BYOD are
present and here to stay. As an
analogy, home security is more
complex for a bigger house with
more entrances and windows. So too
is systems security when smartphones
and other remote devices present
new entry points to be analyzed and
protected.
All of the security tips presented
here are guidelines to aid agencies in
diminishing security and privacy risks
and managing them.
The Agents Council for Technology (ACT) is
designed to provide technology information for
independent agents. ACT is a partnership of
agents, companies, technology vendors and
associations dedicated to enhancing the use of
technology and improved work flows within the
Independent Agency System. Its major areas of
focus are agent and agent-carrier productivity,
Internet marketing and agency security, as well
as understanding trends that will drive consumer
expectations and business opportunities.
Please judge us by the company we keep!
Berkshire Hathaway Group
We are proud of our parentage (and our cousins!)
and strive to live up to the family name.
To learn more about agency appointments
with us, go to:
www.guard.com/apply
Berkshire Hathaway
GUARD
Insurance
Companies
Featuring One-Stop Insurance Shopping for Small- to Mid-Sized Businesses
We write Workers' Compensation policies nationwide and make available complementary Businessowner's Policy, Commercial
Umbrella, Commercial Auto, and Disability coverages in select states. We pride ourselves on our easy submission process;
competitive pricing; fast, fair claims handling; cash-flow friendly payment terms; and superior customer services.
|March-April 2015| KANSAS INSURANCE AGENT & BROKER
5