7 Critical Mobile Computing Security Measures for Nonprofits

Business Advisory Report Reveals 7 Critical Security Measures Every Nonprofit Must Put In Place NOW With Mobile Computing

7 Critical Mobile Computing Security MeasuresThere’s no doubt about it – the Internet and mobile computing and cloud computing have made our lives easier and our nonprofit organizations more productive, cost-effective and competitive. But make no mistake about it: the Internet is also a breeding ground for thieves and predators, not to mention an enormous distraction and liability if not used properly.

It is causing people to be casual, careless and flat-out stupid about their privacy in an increasingly litigious society where heavy fines and severe reputational damage can occur with one slip up – which is why you cannot be casual or careless about introducing it to your nonprofit organization. You can’t turn on the TV or read a newspaper without learning about the latest online data breach. And mobile devices are easily misplaced and stolen.

Because of all of this, if you are going to allow employees to use mobile computing devices – particularly personal mobile devices – to access, store and use the data of your nonprofit organization, then it’s critical that you have these 7 security measures in place.

  1. Implement a mobile computing device policy

    This is particularly important if your nonprofit employees are using their own personal devices to access organization e-mail and data. If that employee leaves, are you allowed to erase organization data from their phone? If their phone is lost or stolen, are you permitted to remotely wipe the device – which would delete all of that employee’s photos, videos, texts, etc. – to ensure YOUR nonprofit information, or your donors information, isn’t compromised?
    Further, if the data in your organization is highly sensitive, such as shelter resident records, for example, credit card information, financial information and the like, you may not be legally permitted to allow employees to access it on mobile computing devices that are not secured, but that doesn’t mean an employee might not innocently “take work home.”
    If it’s an organization-owned device, you need to detail what an employee can and cannot do with that device, including “rooting” or “jail breaking” the device to circumvent security mechanisms you put in place.

  2. Require STRONG passwords and pass-codes to lock mobile computing devices

    Passwords should be at least 8 characters and contain lowercase and uppercase letters, symbols and at least one number. On a cell phone, requiring a pass-code be entered will go a long way in preventing a stolen device from being compromised.

  3. Require all mobile devices be encrypted

    Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that unlocks (decrypts) the data.

If you have given, or plan to give your employees the ability to access data and systems belonging to your nonprofit organization with mobile devices – DON’T … until you’ve read this free executive report.

To read the full Business Advisory Report, fill in this contact form and we’ll email it to you.