As smartphone devices become more widely adopted in corporations especially c-level, people can take advantage of tools and apps already available to handle communication.
When looking at these mobile tools, there are key functionalities to consider based upon what your management needs are…
1. Organizing and syncing key contacts
2. Accessing key documents
3. Exchanging notes
4. Communicate and track groups of people
5. To-do lists and reminders
So what are some easy mobile tools that could help you streamline communication between you and staff?
Sync key contacts
One option to consider is iCloud especially for syncing key contacts. If you have an Android device try a service like gmail, Google docs and Google Calendar.
Access to key documents
You can download apps for cloud-based storage services like Dropbox and Box.net. These freemium models also have premium services you can utilize for more storage space and bigger file downloads. You can also invite other people to share these files.
Access to important notes
With Evernote, all of your notes, web clips, files and images are made available on every device and computer you use.
Communicate and track groups of people
Group messaging apps such as GroupMe, Find My Friends, and Kik uses GPS to locate your contacts and send targeted messages with certain groups.
Shared to-do lists and reminders
Wunderlist is a fairly easy and free task management tool that allows you to create lists for projects and to-dos and share with colleagues so they can add to list. Wunderlist works on Android, iPhone and iPad. You can also look at calendar reminders like Tungle.
Showing posts with label smartphones. Show all posts
Showing posts with label smartphones. Show all posts
Tuesday, March 20, 2012
Sunday, January 29, 2012
Avoiding A Mobile Crisis: Protecting Your Company’s Data on Smartphones
While smartphone devices provide ample opportunity for companies to manage day-to day operations away from their desktop, there is also a risk that important company data can fall into the wrong hands if not careful. More than 70 percent of people surveyed by Sunnyvale, Calf based Dimensional Research say the use of personal mobile devices for work purposes have contributed to increased security-related problems. When one of those tools goes missing, not only would the employee's personal information be at risk, but company email, messages, client contact information, company log-ins and access codes all could be potentially exposed.
According to the report, the No 1 factor affecting the security of sensitive data over mobile is lack of employee awareness of their company’s security policies. Companies need to invest in software and gadgets to not only track company-affiliated mobile devices, but protect and manage the work information stored on those devices. In addition, companies should also consider these following tactics to further avoid a corporate mobile meltdown:
1. Employee training on mobile device security. Employees should be made aware of basic safeguards such as updating passwords and having the ability to wipe a stolen device.
2. Give employees the tools they need to make sure they can find their devices in case they go missing. ZOMM and Phone Halo are both devices that alert the user when they're about to leave their smartphone behind. With ZOMM, the user carries a small sensor, say on a keychain. Phone Halo's tag can be attached to keys, a wallet, purse or other items. Both sound an alarm when the user is parted from their phone. Your company can even host monthly or quarterly lunch and learn meetings to give demonstrations to your employees on these mobile tools. Be sure to include your IT staff in these meetings so they can help employees install anti-malware and encrypt confidential data.
3. Create company policies on what kind of company data employees can store on their personal mobile devices. You should also have contingency plans when an employee leaves the company and you can securely remove company data from that device.
4. If your company has an app that primarily stores your corporate crisis communication plan, it’s important to only give key stakeholders access to that plan (company personnel that will be involved in crisis situations). Be sure to keep your plan password-protected and have a policy in regards to the app’s distribution and content management.
As mobile devices continue to become more prevalent in business operations, companies should invest time and resources to stay updated on current technologies and news surrounding data protection. We’ll continue to explore these stories more in upcoming posts surrounding web 2.0 in corporate crisis.
According to the report, the No 1 factor affecting the security of sensitive data over mobile is lack of employee awareness of their company’s security policies. Companies need to invest in software and gadgets to not only track company-affiliated mobile devices, but protect and manage the work information stored on those devices. In addition, companies should also consider these following tactics to further avoid a corporate mobile meltdown:
1. Employee training on mobile device security. Employees should be made aware of basic safeguards such as updating passwords and having the ability to wipe a stolen device.
2. Give employees the tools they need to make sure they can find their devices in case they go missing. ZOMM and Phone Halo are both devices that alert the user when they're about to leave their smartphone behind. With ZOMM, the user carries a small sensor, say on a keychain. Phone Halo's tag can be attached to keys, a wallet, purse or other items. Both sound an alarm when the user is parted from their phone. Your company can even host monthly or quarterly lunch and learn meetings to give demonstrations to your employees on these mobile tools. Be sure to include your IT staff in these meetings so they can help employees install anti-malware and encrypt confidential data.
3. Create company policies on what kind of company data employees can store on their personal mobile devices. You should also have contingency plans when an employee leaves the company and you can securely remove company data from that device.
4. If your company has an app that primarily stores your corporate crisis communication plan, it’s important to only give key stakeholders access to that plan (company personnel that will be involved in crisis situations). Be sure to keep your plan password-protected and have a policy in regards to the app’s distribution and content management.
As mobile devices continue to become more prevalent in business operations, companies should invest time and resources to stay updated on current technologies and news surrounding data protection. We’ll continue to explore these stories more in upcoming posts surrounding web 2.0 in corporate crisis.
Subscribe to:
Posts (Atom)