Let’s first break it down by 2 categories of data that can be used outside the office. You have data that is accessed 1) with “Internet” and 2) with “No Internet.” With internet access, data is typically real-time and synchronized with company databases. With no internet access, this is typically data that is stored on a device like a phone or laptop when there is not access to the internet then synchronized with company systems once internet access to the company server is restored. “No Internet” assumes you aren’t connecting through your phone provider’s data connection, nor through public Wi-Fi. Connecting to the Internet through your phone provider’s data service is slightly safer than via public Wi-Fi, however, anytime you’re connected to the Internet Section 1 below (Internet Access) should be observed.
1. Internet Access
2. No Internet
Additionally, all mobile devices which contain work material (email or documents) should be secured with a password or passcode. We’ve all heard the stories of lost or stolen phones, tablets & laptops with sensitive data on it, and that’s only the government’s devices we’ve read about.
Lastly, ask your IT department to check out anything suspicious you accept it or click “OK.” It will take them about a minute to confirm if it is harmless. The alternative could take hours to clean or worse.
Complete Programmed Accounting, Inc. (CPA, Inc.), was founded in 1992 with the following mission statement: “The ability to take advantage of the power of timely information lies in the successful implementation of complete, appropriately configured and properly installed financial and management computer systems.”
Complete Programmed Accounting is an ERP & CRM Integration Specialist in the central Indiana area with over 20 years of experience supporting SYSPRO ERP, SYSPRO CRM, TRAVERSE ERP, TRAVERSE CRM, Platinum for DOS, and Platinum for Windows, where your support is our service.
Contact Completed Programmed Accounting at: (317) 290-8702. Email: sales@cpa-inc.com. The Complete Programmed Accounting Web site is located at: www.cpa-inc.com
Follow Complete Programmed Accounting, Inc. on:
Twitter: http://www.twitter.com/CPAIncERP
LinkedIn: http://www.linkd.in/1k0Sp0d
Another version of this blog was previously posted on September 21, 2014 on CPA, Inc’s BLOG site: Personal tablets and laptops pose a system threat to our IT infrastructure. How can we keep it secure from outside threats
Photo courtesy of www.freedigitalphotos.net