Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation
Isometric illustration of a smartphone with a padlock, shield and key

Remember to Include Your Phone in Your Cyber Security Planning

Our phones are a treasure trove of personal information, from financial details to personal messages, photos, and contact information. All that information lives behind the little glass screen in the palm of your hand. And if your team uses phones for work, they probably have access to sensitive company systems like email, contact lists, and network access. This makes them a weak point in your cyber security if not kept secure.

Criminals are well aware of this, and they target our phones just as much as they do our networks and servers. But it’s not just cybercrime that you need to worry about, even just losing your phone or having your phone stolen can put your data at risk.

Whether you issue company phones or your employees use their own, it's important to take some simple security measures to protect your data and avoid disaster.

Start by setting up a PIN and biometric login, like a fingerprint or face scan, to access the device. Only install apps from trusted sources to ensure you're using genuine software and enable Multi-Factor Authentication on all apps that store even a small amount of sensitive data. And ALWAYS make sure your phone is running the latest version of its operating software.

Be careful about where you connect to Wi-Fi. If you work remotely or often connect to public networks, consider using a Virtual Private Network (VPN) Secure Access Service Edge to add an extra layer of security. This is because you never know who could be monitoring traffic on a public network.

Smartphones have transformed how we live, both at work and at home, but it’s too easy to take them for granted. And that could be a costly mistake.

If you have questions or need advice on how to keep your mobile devices more secure just get in touch!

Until next time, keep fit and have fun!

(TYYV) The Yada Yada Version:

Our phones contain our entire personal information and yada yada yada don’t forget about keeping your phone secure from cybercrime. 

Mitch Redekopp
Article Written by Mitch Redekopp

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3

306-933-3355

Copyright © 2024 - All Rights Reserved

crossmenu