• Home
    • Highlights

      Business Process Management With Workflows

      ERPNext has a fast way to design and automate business process workflow.

      In ERPNext, alarms and triggers can be set to alert business process owners when the tasks are overdue:enabling business automation.

      This business automation ensures that work is done in a timely fashion.

      ERPNext is free accounting software that enables sustainable business growth and will support your future requirements.

      Data At Your Finger Tips 24/7 With The ERPNext App

      ERP Android and iOS mobile apps

      With the ERPNext apps, your team can capture information on the go on any Android or iOS device, any time, anywhere.Besides having an online crm on the go,they can also check online, real time inventory levels, record new orders directly on the mobile device, create quotations, and send invoices.

      Secure Payment Integration to PayPal

      ERP integration to PayPal

      Delight your customers with ERPNext's integration to PayPal (or any other payment gateway of your choice) by offering greater convenience. Read more...

      Easy and secure cloud backup to Dropbox

      ERP backup to Dropbox

      ERPNext backs up your database to Dropbox where it's always safe and secure. Dropbox offers additional layers of security, so you never have to worry. Read more...

    • Features

      Available Modules On ERPNext

      Financials

      Finance

      • Billing & Payments
      • Banking
      • Multi-currency Accounting With Automated Exchange Rate Update
      • Budgets
      • Cost Accounting
      • Financial Analytics
      Sales CRM

      Sales

      • Shopping Cart & Ecommerce Website
      • Point Of Sales
      • Online CRM
      • Quotes & Sales Orders
      • Deliveries
      • In-app SMS
      • Automated Emailing
      • Customer Statements
      Buying or Purchasing

      Purchase

      • Procurement Management:Automated Stock Replishment
      • Procurement Management:Rule Based Pricelists
      • Purchase Orders & Goods Received Notes
      • Back To Back Ordering
      Manufacturing or Production

      Prod.

      • Hierarchical Bill of Materials & Costing
      • Make To Order Process
      • Life Cycle Management
      • Manufacturing Planning
      Human Resource Management and Payroll

      HR

      • Human Resources
      • Payroll
      • Expense Claims
      • Payroll Management :Leave Allocation
      Project Management

      Projects

      • Project Management
      • Project Gantt Chart
      • Management Tools
      • Online Project Management
      Help desk support

      Support

      • Help desk support
      • Service desk
      • Warranty Claims
      • Issue Tracking
      • Support Ticket System
      Team Collaboration

      Tools

      • In App Messages
      • Documents Assignments
      • Tags
      • Calendar
      • To Do Lists
      • Emails
      Inventory Control

      Stock

      • Inventory Control With Automated Reordering
      • Inventory Control For Serialized & Batched Items
      • Inventory Control:Landed Costs
    • About Us
    • FAQs
    • Contact
    • Industries

      Industries We Serve:

      • Manufacturing
      • Energy
      • Footwear
      • Retail
      • Maintenance
      • Distribution
      • Health Care
      • Printing
      • Equip.Rental
      • Non Profit Org
      • Fashion
      • Prof. Services
      • Furniture
      • Proj.Mgment
      • Food
    • Services
    • Blog
    • TALK TO A REP : (021) 554 1021
 

4 security risks you must know about personal mobile devices for business

Home / Blog / 4 security risks you must know about personal mobile devices for business use
 

The proliferation of mobile devices such as smartphones and tablets has meant that we have personal computing is with us wherever we go. These devices allow us to take work anywhere with us. Whilst business strategies that allows staff to bring their own devices boosts productivity, they also poses a number of security risks if no safety precautions are put in place. In this article, we review the cause of these problems and the security risks you should know before implementing a bring your own device strategy (BYOD) in your business.

malware

Viruses are a big problem when implementing BYOD strategies into your business. Using personal devices means your employees can access whatever sites or download any mobile apps that your business would normally restrict to protect your system.

Jailbreaking or rooting a device also puts your systems at risk because it removes limitations imposed by the manufacturer to keep the mobile software updated and protected against external threats. It’s best to understand that as your employees have the freedom to choose whatever device they want to work with, the process of keeping track of vulnerabilities and updates is considerably harder. So if you’re thinking about implementing BYOD strategies to your business, prepare your IT department for an array of potential malware attacks on different devices.

Hackers

Personal devices tend to lack adequate data encryption to keep people from snooping. This along with the fact that your employees might not have updated their devices can allow hackers to infiltrate your IT infrastructure.

Connecting to open Wifi spots makes your company more susceptible to hackers. Open wireless points in public places can put device owners at risk because there is a chance that hackers may have created that hotspot to trick people into connecting. Once the device owner has connected, attackers can simply surveil web activity and gain access to your company’s accounts.


Lost devices

Another risk your business has to deal with, is the possibility of your employees losing their personal devices. When devices with sensitive business accounting information are lost, there is a chance that this could end up falling into the wrong hands. Additionally, if an employee forgets to use a four digit PIN code to lock their smartphone or tablet, anyone can gain unauthorized access to valuable business data stored on that particular device. Therefore, your small business should consider countermeasures for lost devices like completely wiping the device of information as soon as an employee reports a missing or stolen phone

Data breach

The biggest reason why businesses are weary of implementing a bring your own device strategy (BYOD ) strategy is because it can potentially leave the company’s ERP system vulnerable to data breaches. Personal devices are not part of your business’s IT infrastructure, which means that these devices are not protected by company firewalls and systems. There is also a chance that an employee will take work with them, where they are not using the same encrypted servers that your company is using, leaving your accounting system vulnerable to inherent security risks.

So you might be thinking that it would probably be best to just avoid implementing a BYOD strategy in the first place. However, BYOD will help your business grow and adapt to the modern workplace, and should not be dismissed as a legitimate IT solution. It’s just important to educate your company about these risks so that problems won’t occur for your business down the line.

  • Facebook
  • Twitter
  • LinkedIn

Other Posts

  • Getting to the bottom of the solution behind the solution :some considerations when an ERP accounting system
  • 10 top signs your small business needs a cloud accounting ERP solution
  • 3 Prep Tips for cloud ERP Accounting system implementation

 

  • What makes CRM critical to a business?
  • Trusting open-source: free ERP accounting software -5 must knows
  • Mobile apps for cloud ERP accounting systems to delight clients

cloudERP South Africa


  • Pretoria | Cape Town
    298 Sandalwood Drive | Newlands | Pretoria | 0181
    (012) 348 8169 (HQ) | (021) 554 1021
    consulting@clouderp.biz
    Postenet Suite 382 | Private Bag X15 | Menlo Park