Best Practices for Keeping Mobile Data Safe

mobile phone in hand with security cloud over it
By Ben Hayden

2 minutes

Follow these guidelines to help protect business information stored on easy-to-lose smartphones and tablets.

Sponsored by Shazam

As technology becomes more and more a part of personal and work life, it’s important to take precautions to protect stored data. If your employees use a smartphone or other mobile device for work, follow these guidelines to protect business information.


  • Turn off Bluetooth and auto-pairing when they aren’t being used.
  • Use updated Wi-Fi protected access or a virtual personal network, and never share your phone’s hotspot service set identifier with others.
  • Install mobile device management tools that allow the data and security controls to be controlled remotely.


  • Use a unique PIN made of at least six alphanumeric characters to lock smartphones.
  • Set devices to lock after three minutes of non-use, and never walk away without locking your device.
  • The oil on your fingers can leave a trail, giving away the passcode; remember to regularly clean the screen.


  • Encrypt your smartphone and SD card in the device’s settings.
  • Don’t store contacts or other sensitive information on the SIM card—it could be accessed even if the device is locked and encrypted.
  • Some app stores are good at keeping malware out, but others aren’t. Always read the reviews before downloading an app. If there are very few reviews or a high number of negative comments, don’t download.
  • Don’t store any data on your device that you can’t afford to lose.
  • Be familiar with the process for securing your data when a smartphone is lost or stolen.

Don’t let a misplaced mobile device jeopardize the security at your institution. Give employees these guidelines to keep information safe from fraudsters.

Ben Hayden is risk services manager for CUES Supplier member Shazam, Johnston, Iowa. Hayden utilizes his expertise in cyber investigations, financial crimes and digital forensics to assist financial institutions in evaluating their cybersecurity vulnerabilities. He manages SHAZAM’s risk management services, helping member institutions mitigate their risks in information technology, cybersecurity, physical security and BSA/ACH compliance. SHAZAM is a national member-owned debit network, processor and core provider delivering choice and flexibility to community financial institutions throughout the U.S. since 1976. SHAZAM is a single-source provider of the following services: credit card, debit card, core, fraud, marketing, merchant and more.

CUES Learning Portal



Subscribe to Skybox

Get two to four blogs delivered via email each week!