Get instant
small business insurance quotes


Home > Professional Liability/Errors & Omissions Insurance > News
 

Methods for protecting data on mobile devices

Published:

With many businesses trusting cloud computing and mobile devices with their content, such as business processes, policies, actuarial data and product lines, National Underwriter composed a list of ways businesses can protect data from hackers.

Mobile devices make many business processes easier, but also create greater risks for businesses. The source said businesses can protect this data by making stronger passwords, and changing them every so often, and also utilizing inactivity timeouts, which lock devices after periods of inactivity.

More practices provided by the website include device lock-outs, which deny access after several attempts to use a device by entering a wrong password, while another way to maintain security of data is to become educated on the technology and ways of managing the mass amount of data stored on devices.  

While these practices may be able to help businesses protect their data, they should still have a professional liability insurance policy, which gives businesses a defense against issues such as cybercrime.

According to SC magazine, businesses must extend their mobile security strategies by including encryption policies, which secure the data itself, making it much harder for cybercriminals to access the data.

WHY Business Insurance Now?

Learn why thousands of small businesses trust Business Insurance Now as their insurance agency.

Take 15 minutes to see how we can help you protect your business.

  • FREE, no-obligation quotes.
  • Complete one online application to compare multiple quotes.
  • Fast response—typically less than 24 hours on week days.
  • We are a nationwide insurance agency covering 48 states.
  • We work directly with you to evaluate your insurance options.
  • We only work with the top business insurance carriers in the country.
  • Expert, licensed insurance agents to guide you through the process.