September 12, 2012

New iPhone 5 Influx? Top 5 Ways You Can Protect Your Company and Information

Stacey Garcia

Today Apple announced the release of their new iPhone 5, setting off another frenzy of consumer acquisition and a corresponding influx of iPhones and other personal devices brought into the workplace - with employee expectations that they can connect these devices to the company network.

Unfortunately, many organizations are still challenged with allowing these devices to connect to corporate networks in a safe and secure manner. Today's threats are evolving and the likelihood of malware and/or data theft or loss with mobile devices has been on the rise. 

With mobility continuing to expand and the addition of new platforms and emerging technology, it is your responsibility to make sure that your company remains protected from the various mobile threats. Here are five things you can do to start protecting your company while enabling mobile devices whether they are bring your own device (BYOD) or corporate-owned:

  1. Allow only certain "trusted" mobile devices access to corporate networks
  2. Establish a minimum security requirement for all devices connecting to your corporate networks
  3. Require a passcode to be enforced on all mobile devices
  4. Do not allow jail broken devices to access corporate data
  5. Define a clear strategy on what to do if a device is lost or stolen

All of these and more should be addressed in your company's acceptable use policy (AUP) for mobile devices. For more information on creating an AUP, please download the Websense BYOD Acceptable Use Policy Kit.

For more information on the Websense TRITON Mobile Security Solution, please check out this page.

From what you've heard about the new features, do you believe the iPhone 5 will sell more, less or the same as the last version?

About Forcepoint

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.