Graphic of hands holding a locked mobile
Graphic of hands holding a locked mobile

Whether staff have a business device or use a personal one to access your organisation’s data and accounts, you need to make sure they are secure. Take a look at our recommended steps below:

Enable authentication

Make sure some type of authentication process is in place on the device. This could be a password, finger-print recognition or facial recognition.

Protect the device if lost or stolen

Configure devices so that if they are ever lost or stolen, they can be tracked, remotely wiped, remotely locked, or you can retrieve a backup of data.

Do not use public Wi-Fi

When accessing or sending sensitive data, don’t connect to a public Wi-Fi or hotspot. Use a 3G, 4G or 5G mobile network – they will have built in security. You could also use a wireless dongle or Virtual Private Networks (VPNs).

There is no simple way to see who a public Wi-Fi or hotspot belongs to. That means someone could access the data you are working on, as well as login details whilst you’re logged in.

Keep the device up to date

Device manufacturers regularly release updates for operating software. These are key to keeping the devices secure, so make sure you stay on top of these. Most devices have an ‘automatic update’ feature you can switch on.

Replace devices that are no longer supported by the manufacturers. These devices will become vulnerable as updates and security patches are no longer available.

Keep apps up to date

Make sure all apps installed on your device are kept up to date. Updates not only provide performance and usability updates, but also security patches. Most devices have an ‘automatic update’ feature you can switch on.

Microsoft Endpoint Manager

Did you know Microsoft Endpoint Manager can be used to enforce passwords/PINs on devices accessing organisational accounts. It can also be used to control what people can do with company data, for example: stop devices from forwarding and/or downloading data to personal devices.

How Can We Support You

Our Cyber Security team can support you in keeping portable devices secure, whether they are company owned or personal. We are also partnered with Threatlocker to deliver a zero-trust model of endpoint protection.

Latest Guides

Microsoft 365 Monthly Feature Update. Microsoft Logo.
Microsoft 365 Monthly Feature Update
Check out our top Microsoft 365 feature releases each month.
Windows 11 homepage
Top Windows 11 Features
With Windows 10 going end of life this October, let's look at our top Windows 11 features.
Graphic of a piece of paper and a padlock
Five Things Your Cyber Incident Response Plan Needs
Whether you’re starting from scratch or having a refresh, here are five things to include in your cyber incident response plan.