While consumers might be able to make do with a simple PIN code
to protect their Nexus 7 tablet, business users need to give a bit more
thought to protecting their device.
Here's a rundown of what I did to protect my new Nexus 7.
Given the diversity of Android devices on the market, this
information may or may not be applicable to other Android-powered
devices.
All these options can be found under Security in the Settings app.
Screen lock
While using "Face Unlock" or a pattern to unlock the Nexus 7 might be
convenient, neither offers the security of a PIN code or password.
Whichever you choose, consider six characters a minimum, and I would
recommend bumping this up to eight or more if you carry sensitive
information on your tablet.
Automatically lock
I set this to 5 seconds because this gives me a small window between
the device going to sleep and it needing a password, bit not such a big
one that it could be a vulnerability.
If you have sensitive information, then push this up to "Immediately".
Power button instantly locks
This is a no brainer. If I switch off the device, I want it locked immediately.
Encryption
Encrypting a tablet is quite a long process, but it's important if
you want to make sure that the data on the device is safe from prying
eyes. Encryption is the best way to make sure that all data you have on
the tablet remains safe in the event of the tablet being lost or stolen.
Verify apps
You don't want any old junk installed on your BYOD or business tablet, so make sure that apps only come from reputable sources.
Other steps
Here are some other precautions that anyone using an Android tablet should take if it is being used in a business setting.
- Install an antimalware app. Don't fall into the trap of thinking that Android — or, for that matter, any other platform — is invulnerable. Every little bit of protection helps.
- If possible, pick an antimalware app that supports a "find your device" and remote wipe.
- While it's not applicable to the Nexus 7, if you use external storage on your Android tablet — in the form on an SD card — then make sure that this is encrypted.
- Don't root the device. While this is OK for consumers, it dramatically increases the attack surface, making it unwise in a business setting.
Source by ZDNet
No comments:
Post a Comment