You can be on Entrepreneur’s cover!

Apple's New 6-Digit Passcodes: What Do They Mean for Your BYOD Policy? Are you even thinking about mobile security for your workers? Three best practices to start with.

By Caleb Barlow

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

Chiara Pinna | Stocksnap.io

Apple's release of iOS 9 last month has done us all a tremendous public service: It's brought mobile security into the spotlight for small businesses.

Related: 11 Tips to Secure Mobile Devices and Client Data

This new and latest version of the operating system expands the iOS default pass-code lock setting from a four-digit to six-digit PIN. That's an especially big plus for businesses with a "bring your own device" (BYOD) policy, allowing employees to work on their personal laptops, smartphones and tablets.

A six-digit PIN, in essence, makes it dramatically more difficult for potential attackers to crack devices. By expanding the default length of a passcode by just two digits, the number of potential entry combinations increases from just 10,000 to one million.

But beyond this welcome increase in protection for users of iPhones, the iOS9 move has prompted many businesses to begin questioning how they address mobile device security overall. New research from IBM Security found that a vast majority of businesses today don't sufficiently secure their employees' devices with even the most rudimentary of features.

The findings reveal that among those businesses that currently enforce passcode use on employee mobile devices at all, 87 percent require only a numeric PIN. Of those companies, 79 percent mandate the bare minimum: a four-to-five-digit numeric passcode that takes just 18 minutes for sophisticated cybercriminals to crack, according to the iOS Hacker's Handbook.

A six-digital alphanumeric passcode, by comparison, might take the most skilled hacker up to 196 years to infiltrate.

This minimalist attitude toward mobile security among most mobile users and their employers has continued despite the growing value of company records: The average cost of a lost or stolen record containing sensitive and confidential information increased this year to $154 -- reflecting the rising threat from cybercriminals looking to capitalize on mobile as an attack vector.

Apple's move, however, could be the catalyst needed to bring mobile security into focus, especially for small businesses that simply cannot afford costly data breaches. Considering that the BYOD phenomenon has reached its prominence largely due to the simplicity, flexibility and convenience that mobile provides, it's incredibly encouraging that as the security of devices evolves, the tech industry is making it simpler for users to better protect themselves, through such innovations as touch authentication.

Making security strong yet simple is critical to an effective defense against cybercrime. A recent Ponemon Institute study found that many workers don't understand the risk that an insecure mobile devices poses for their employers, prompting them to look for workarounds. Millennials, in particular -- who by 2020 will make up approximately 50 percent of the U.S. workforce -- have grown up in a world where technology is at their fingertips, and if extra steps for protection prove to be a hassle, millenials are going to reject them, or find a way to circumvent them.

In fact, the younger generation's comfort with mobile and social can lead them to take unnecessary risks, such as downloading new, unvetted apps, and connecting to hot spots. A recent survey found that 56 percent of millennials were fine with downloading apps without reading permissions. This is a scary realization, considering that IBM recently found that nearly 40 percent of companies that issue mobile applications for customers aren't properly securing them. This leaves open tremendous windows of opportunities for hackers.

Related: Mobile app security firm Wegilant raises $500K from Ravi Gururaj, other angel investors

Apple's latest security features are the first step on the path toward shutting down mobile attacks, but device-level security is only the start of the conversation. While the move to six digit passcodes will spur nearly 80 percent of companies to update their BYOD policies, it will also open the door for organizations -- small businesses, especially -- to begin thinking more deeply about how to best protect and manage data on mobile devices. This entails use across the entire transmission path: from device to network to application and beyond.

The key to successful implementation will be to collaboratively develop employee-focused security policies that can account for the evolving mobile technology and threat landscape. To get started, here are three best practices to consider:

  1. Many employees don't understand the risks of using unsecured mobile devices and apps, nor are they trained on mobile security in the workplace. Communicating this information is key.
  2. Regardless of their generation, industry or job, the vast majority of people want to balance ease of use with secure protection of their data. Require passcodes for employee mobile devices, but also ensure that they can employ easy-to-use technology, such as touch authentication (if available) which will keep devices secure without sacrificing convenience.
  3. Investigate ways to strengthen the security of data on mobile devices, and use technology to your benefit via tools that can scan apps, detect malicious apps/malware and then take action if needed.

Overall, flexibility is key to accomplishing mobile security goals. Offering employees the freedom and flexibility they crave with their mobile usage should be a priority -- as long as it's done securely enough to help protect against the world's increasingly large and dangerous networks of hackers.

Related: Our Collective Mobile Security Blind Spot

Caleb Barlow is the vice president of IBM Security. With his global experience in product management, software development and service, Barlow has led multiple software product portfolios including application, data, mobile and critical infrastructure security and has consulted on more than a dozen acquisition pursuits. Most recently, he led IBM’s acquisition of Trusteer, and was a key strategist behind the recent acquisition of Fiberlink.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Side Hustle

He Took His Side Hustle Full-Time After Being Laid Off From Meta in 2023 — Now He Earns About $200,000 a Year: 'Sweet, Sweet Irony'

When Scott Goodfriend moved from Los Angeles to New York City, he became "obsessed" with the city's culinary offerings — and saw a business opportunity.

Personal Finance

How to Get a Lifetime of Investing Experience in Only One Year

Plus, how day traders can learn a lesson from pilots.

Branding

94% of Customers Say a Bad Review Made Them Avoid Buying From a Brand. Try These 4 Techniques to Protect Your Brand Reputation.

Maintaining a good reputation is key for any business today. With so many people's lives and shopping happening online, what is said about a company on the internet can greatly influence its success.

Travel

Save on Business Travel with Matt's Flight's Premium, Only $80 for Life

This premium plan features customized flight deal alerts and one-on-one planning with Matt himself.

Science & Technology

Here's One Reason Urban Transportation Won't Look the Same in a Decade

Micro-EVs may very well be the future of city driving. Here's why, and how investors can get ahead of it.

Marketing

I Got Over 225,000 Views in Just 3 Months With Short-Form Video — Here's Why It's the New Era of Marketing

Thanks to our new short-form video content strategy, we've amassed over 225,000 video views in just three months. Learn how to increase brand awareness through short-form video content.