Mobile Devices and Spying In The Workplace


Mobile devices in the workplace are here to stay.

From smartphones to tablets, this convenient technology brings added freedom and benefits to employees, but also creates a high security risk for businesses. More often than not, a tool like mobile device management (MDM) is utilized to protect confidential data, but there is a common misnomer that MDM can be sued for spying purposes. This is simply not the case.

MDM protects confidential information from thieves and hackers.

Whether your company embraces a Bring Your Own Device (BYOD) model or provides mobile devices to employees, it is absolutely critical to safeguard the company’s IT infrastructure against security breaches and protect the confidential information that can be accessed if a mobile device is lost or stolen. Our MDM software is designed only to service and secure the mobile devices – no spying – period!

MDM Services Provided

MDM Myths Debunked

Configure access to a corporate Exchange email or a personal IMAP/POP account We cannot view, track, capture or store emails or other messages sent from configured accounts
Configures VPN network and Wi-Fi settings We cannot view or monitor websites visited or other online activity
Enables corporate directory search for a contact or email address when composing emails We cannot view or access contact information stored on the mobile device
Sets passcode requirements, including passcode length, character requirements and maximum passcode age We are only able to perform a reset in the event a user forgets their passcode; the passcode cannot be viewed by technicians
Specifies the number of times a passcode can be entered incorrectly before all data on the device is erased We are only able to perform a remote wipe in the event someone other than the user attempts to access the device; we cannot see who is trying to gain access
Geographical location lookup We will attempt to pinpoint the physical location of a mobile device on a geographical map only when a device is reported lost or stolen by the device owner
Performs a complete wipe in the event of a lost or stolen mobile device We will only perform this action when a loss or theft is reported by the owner of the device
Selective wipe of mobile devices We will remove any policies and configurations that were deployed to the device when it was under management in the event an employee leaves the company, leaving personal information intact.
When company policy requires, The MDM software can restrict access to app store s, explicit media, use of the web browser and websites such as YouTube, the ability to screen capture, the use of voice dialing or voice assistants, and the use of camera We will only activate these restrictions when company policy dictates or when regulatory requirements exist.

The goal of our MDM solution is only to secure and protect the sensitive company information stored on employee-owned and corporate mobile devices, as well as maintain the overall integrity of the company’s IT system by putting the necessary policies and configurations in place to prevent or eliminate security breaches. Your employees have nothing to fear when installing MDM software on their mobile devices and are welcome to contact us if they would like any additional information about the services provided or the capabilities of the software.

 Related Posts:

 

  • author Daniel BardinPublished on September 6th, 2013

Tech insights

Sky Zone Is Now Open In Clifton Park!

Learn more

Cyber Security Awareness Month 2019: The State Of Cybercrime

Learn more

See You At The 2019 Saratoga County Business-To-Business Expo on Thursday!

Learn more