{"id":7068,"date":"2014-07-10T06:35:00","date_gmt":"2014-07-10T11:35:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/if-you-operate-with-an-iphone-or-android-phone-you-might-be-in-for-a-security-struggle-if-your-device-is-lost-or-stolen\/"},"modified":"2014-07-10T06:35:00","modified_gmt":"2014-07-10T11:35:00","slug":"if-you-operate-with-an-iphone-or-android-phone-you-might-be-in-for-a-security-struggle-if-your-device-is-lost-or-stolen","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/if-you-operate-with-an-iphone-or-android-phone-you-might-be-in-for-a-security-struggle-if-your-device-is-lost-or-stolen\/","title":{"rendered":"If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen."},"content":{"rendered":"
<\/p>\n
Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data.<\/p>\n
Here are possible minimum requirements every business in {city}Â must have:<\/p>\n
If you do not have these steps employed yet, here are some recommendations to consider for maximum information security:<\/p>\n
There are also available third-party options like Good Technology and MaaS360. They can be used for separating firm and personal data. This comes especially helpful to those who have a BYOD (Bring Your Own Device) policy. However, this can also pose as a challenge as it requires the use of “firm apps†to access emails, contacts, and calendars that do not work as seamlessly as native applications.<\/p>\n
Thinking about a BYOD policy in your {city} business? We can help. Â {company} works with my businesses across {city} to help ensure their mobile computing is very secure. Have questions? Â Give us a call at {phone} or email us at {email}.<\/p>\n","protected":false},"excerpt":{"rendered":"
Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data. Here are possible…<\/p>\n","protected":false},"author":5,"featured_media":7069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-7068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\n