Sign in
Header Main Menu Home Topic Library Certification Local coaching Partners More arrow_drop_down Tools Help & FAQs Feedback
Get started

Bonus Materials

Explore additional topics to enrich your learning experience in all things digital. These bonus videos are not part of the overall Google Digital Garage certification, so think of them as an opportunity to get inspired and expand your knowledge.

Securing employee devices

{[ ((showTranscript) ? 'HIDE' : 'SHOW TRANSCRIPT') ]}
Many businesses today issue smartphones or laptops to their employees. But what happens if these objects are lost or stolen? What happens if someone outside the company gains access?

In this lesson, we’ll look at security for the devices and hardware used in your business.

One thing you can do is establish policies limiting what data is stored on company equipment. If a device only contains the information needed for someone to do their job, there’s less risk to the company if it falls into the wrong hands.

The same applies to mobile devices. If your employees can access company information via smartphones or tablets, think about setting a mobile device management policy. The policy could, for example, require employees to encrypt their devices, require a pin to unlock them, allow remote wiping of data if necessary, or perhaps all of these points.

An extra security measure you can take is to enable 2-step verification for account login on company hardware.

2-step verification works by requiring a user to input a password, as well as something else in order to log into the account. The secondary verification could be a code sent to a user’s phone or a physical security key which they need to plug into their computer. This means the account is protected by something they know, like their password, as well as something they physically own, like a phone or security key. This combination makes it harder for an unauthorised person to log into systems.

2-step verification is also considered an effective way to prevent successful phishing attempts, since you need more than just someone’s password to access a device or account.

In addition, employees should make sure hardware comes from a trusted source before using it. For example, if you receive a USB stick in the post, and you’re not sure where it came from, don’t plug it into your computer.

In this lesson we’ve covered what you can do to reduce the risk of someone accessing sensitive information if your employees’ devices are lost or stolen, as well as being careful only to use hardware you know you can trust.

Think about the devices you use in your business. What could someone do with the information stored on them? What steps could you take now to help secure them?
{[ ((showTranscript) ? 'HIDE' : 'SHOW TRANSCRIPT') ]}
Just as you identify keeping your personal devices secure as important, so should your business prioritise the security of employee devices. In this video, we'll explore:
  • the benefits of developing a device policy
  • how 2-step verification can be used to increase device security
  • tips for maintaining security when using other hardware