Seven tips for securing your mobile data. Let’s be honest: Is it really the fault of problems with a virus protection program, or an insecure hot spot, if notebook users lose data? A recent Gartner study showed that 86 percent of all security events in wireless networks are caused by the mobile devices—and not by insecure data transfer. I work in the mobile security industry, and would like to give you some simple measures for securing your notebook.Tip 1: Demand more discipline from users when on the moveThe only protection against being careless is more care and discipline—but that is difficult when you are under time pressure. Airline passengers lost more than 5,000 mobile devices at airports in Germany, Austria and Switzerland, according to a survey conducted by Utimaco Safeware among the lost-and-found offices at the 10 largest airports in the region. Particularly at airports with a large number of short-distance routes that are primarily used by business travelers, several dozen mobile devices are turned in daily—on heavily traveled days, as many as a hundred. It sounds obvious but bears repeating: If you travel with a notebook, you should always make sure that you really have the notebook case, including all its contents, over your shoulder before you leave the plane, taxi or train.Tip 2: Make passwords more difficult to crackIf the worst happens, and your computer is stolen or lost, there is still hope that your personal data is not all accessible, if the password is difficult enough to crack. A mixture of characters, numbers and letters is considered the most secure—but only if passwords and keys are not stored on the hard disk. For this reason, it is better if the computer prompts for a password before booting. Electronic security solutions enable this. This gives an unauthorized user no chance to somehow get access to the operating system or saved data in any way.Tip 3: Use hardware to supplement password protectionAnalysts at the Meta Group have confirmed what IT managers already know: Passwords alone do not provide optimum protection for data. The alternatives have been available, and in use, for years. Special smartcards or tokens (which look just like a USB stick) store key information that is used in combination with a user password to unlock the computer. Only someone who has the token and knows the password can access the system and the data saved on it. Alternatively, the user’s biometric data can be stored on a smartcard. For authentication, the user’s fingerprint is checked directly on the card, instead of the password. Tip 4: Secure your hibernation modeYou can set up the system to prompt for the password again when the notebook switches back from the screen saver or from hibernation mode to normal working mode. This means your data is still secure if you stop for a break or you are making a phone call in the train or airport.Tip 5: Set up an electronic safeAs a basic principle, you should never save valuable information without protecting it electronically, just as important papers are kept in safes. The electronic pendant is a “virtual” disk drive that securely encrypts and stores all its contents. You can very easily set up an electronic safe of this kind on local hard disks and network directories, on the PDA, and also on mobile devices such as USB sticks and smartcards, CD-ROMs and DVDs to provide secure storage of your electronic data. Tip 6: Implement automatic encryptionTalking about the electronic safe, what use is the best safe if the valuable data is simply left on the shelf next to it because no one takes the time to think about whether a particular document needs protecting at all? Here, data-transparent encryption is a big help. It runs automatically in the background, without being noticed, so the user does not even have to think about storing data securely.Tip 7: Restrict plug and playPlug and play is convenient, but sometimes can be dangerous. If someone connects a USB stick, MP3 player or external hard disk drive to a notebook, it is recognized automatically—and it is then easy to start exporting data and passing it on to the wrong people. The alternative is to lock the computer for all memory media apart from the company’s own memory sticks that cannot be used to run or read programs. This also removes the danger of accidentally loading a worm or virus on your own hard disk if you lend the data medium to someone, and get it back with a “dangerous cargo.” In addition, you should use sensitive data on USB sticks only when it is encrypted, because the smaller the memory device, the greater the danger that it will get lost or stolen.In short, security leaks are not only caused by data transfer, but also by the mobile device itself. The only effective solution is a combination of encryption, authentication and access management. And, not to be underemphasized: Users need self-discipline.Craig Bumpus is president of the Americas for data encryption security company Utimaco Safeware. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe