Mobile Trend Checklist
This checklist helps Argentine SMBs assess whether their mobile practices align with IT best practices in 2015. Review each question carefully to understand your organisation’s posture:
Device Security
- All employee mobile devices are secured with a passcode, fingerprint, or facial recognition.
- Devices are encrypted to protect data at rest.
- Lost or stolen devices can be remotely wiped via an MDM or OS feature.
Application Control
- Only approved or whitelisted business apps are used for work tasks.
- Employees are discouraged from installing unknown third-party apps on work devices.
- App permissions are reviewed and restricted where possible (e.g., camera, GPS).
Network Access
- Company email and file access require two-factor authentication.
- VPN access is provided for secure connections when off-site or on public Wi-Fi.
- Access to internal apps is logged and monitored regularly.
Policy & Awareness
- A Bring Your Own Device (BYOD) policy is in place and has been communicated clearly.
- Employees receive training on secure mobile usage and phishing threats.
- IT regularly reviews mobile access logs and device compliance.
Cost Management
- Roaming and mobile data plans are monitored and controlled for business devices.
- Usage is reviewed monthly to identify unusual or excessive activity.
If your business answered “No” to more than 3 items above, it may be time to revisit your mobile policies and tools. Virtus Group can help you take the next step.
Book your free consultation today:
hello@virtusgroup.com.ar
virtusgroup.com.ar
0800 847 887 (VIRTUS)