{"id":2071,"date":"2019-06-13T17:51:21","date_gmt":"2019-06-13T17:51:21","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=2071"},"modified":"2020-05-01T10:48:26","modified_gmt":"2020-05-01T10:48:26","slug":"best-data-security-practices-for-field-workers","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/","title":{"rendered":"Best Data Security Practices for Mobile-Reliant Field Workers"},"content":{"rendered":"<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">Mobile-reliant field workers encounter more data security risks compared to office workers. They connect using a <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/public-wifi-security-tips\/\">public Wi-Fi<\/a> (which hackers love to exploit) and consistently rely on the Internet of Things (IoT) to accomplish their duties. It\u2019s always a good idea for any company with mobile field workers to maintain good practices when it comes to data security in the field. This article explain <\/span>Best Data Security Practices for Mobile-Reliant Field Workers.<\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt; color: #1679c9;\"><b>Basic Data Security Education<\/b><\/span><\/h4>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><a href=\"https:\/\/www.zdnet.com\/article\/how-to-write-a-good-security-policy-for-byod-or-company-owned-mobile-devices\/\"><span style=\"font-weight: 400;\">ZDNet advises having a solid security policy<\/span><\/a> <span style=\"font-weight: 400;\">in place for your company\u2019s mobile workers. This is especially true if your business abides by the Bring-Your-Own-Device (BYOB) scheme, which simply means that employees may use their own smartphones and other IoT devices for work. <\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">While this can save your business money, it also poses certain risks as employees who use their own devices may also access potentially unsecure apps and websites. <\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">Whether or not you follow the BYOB trend, here\u2019s what your field employees should keep in mind when accessing IoT devices.<\/span><\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt; color: #1679c9;\"><b>Keep all software updated<\/b><\/span><\/h4>\n<p><span style=\"font-weight: 400; font-family: Helvetica; font-size: 12pt;\">Keep your software up-to-date \u2013 it\u2019s the single, simplest way to make sure that connected devices have fundamental software protection. <\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: Helvetica; font-size: 12pt;\">Mobile employees should also use a secure pin, and never connect to public Wi-Fi networks, which tend to be fishing grounds for hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: Helvetica; font-size: 12pt;\"> You should also backup field devices, and in the case of truly sensitive data, encrypt devices for extra security. And if employees lose their devices, it should be reported immediately. <\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: Helvetica; font-size: 12pt;\">This is not everything you can do for mobile data security, but following these basic rules can be enough to make it significantly harder for enterprising hackers to steal your data.<\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt; color: #1679c9;\"><b>Leverage Field Work Management Software<\/b><\/span><\/h4>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">Today\u2019s vital tech advances have spurred the development of a wide variety of work management software designed for mobile use across different industries. <\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">These usually come with their own data security measures in order to protect both customers and product\/service providers<\/span><span style=\"font-weight: 400;\">. <\/span><a href=\"https:\/\/www.verizonconnect.com\/uk\/solutions\/field-service-management-software\/\"><span style=\"font-weight: 400;\">A \u2018Field Service Management Software\u2019 post by Verizon Connect<\/span><\/a> <span style=\"font-weight: 400;\">details how logistics companies use data security in telematics and it involves a variety of factors for securing customer-entrusted files. <\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">This includes driver IDs, logins, restricted data access, and a carrier-grade data centre with full reporting options for consistent data security monitoring.<\/span><\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt; color: #1679c9;\"><b>Authentication via Hardware<\/b><\/span><\/h4>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">Authentication measures that are built into hardware aren\u2019t something new. The same concept has been applied in licensing technologies and tokenisation. <\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">However, Intel takes the idea to the next level with its sixth-generation Core vPro processor, which<\/span> <a href=\"https:\/\/techbeacon.com\/security\/5-emerging-security-technologies-set-level-battlefield\"><span style=\"font-weight: 400;\">Tech Beacon explains has authentication already built into its hardware<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"> This makes field devices such as laptops, tablets, and smartphones physical parts of the authentication process. <\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">Combined with traditional identity verification and authentication methods, this tech can greatly strengthen your company\u2019s overall data security.<\/span><\/span><\/p>\n<h4><span style=\"font-family: Helvetica; font-size: 12pt; color: #1679c9;\"><b>Leverage Specialized Encryption Software<\/b><\/span><\/h4>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-protect-the-sensitive-files-on-your-computer\/\"><span style=\"font-weight: 400;\">Kruptos 2 Go is an example of an encryption software tool<\/span><\/a> <span style=\"font-weight: 400;\">that can provide password-protection for USB and hard drives. Even if your hard-baked authenticated hardware gets lost or stolen, this type of software can serve as another strong layer of defence against would-be data thieves targeting your company.<\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><span style=\"font-weight: 400;\">Ensuring the data security of your company\u2019s mobile-reliant field workers is an important job. While the aforementioned methods work today, the world of cyber security is constantly changing. <\/span><span style=\"font-weight: 400;\">This means that you also need to keep yourself updated on the latest mobile threats, IoT vulnerabilities, and news from the field.<\/span><\/span><\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\">Final thoughts, always remember below data security practices for Mobile-Reliant field workers,<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\">Be aware of your surroundings<\/span><\/li>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\">Physically deter with the use of a locks<\/span><\/li>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\">Always update apps and software<\/span><\/li>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\">Avoid <a style=\"color: #000000;\" href=\"http:\/\/www.kruptos2.co.uk\/blog\/public-wifi-security-tips\/\">public Wi-Fi networks<\/a><\/span><\/li>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\">\u00a0Don\u2019t reuse personal passwords for work<\/span><\/li>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\">Encrypt your files before moving (Kruptos seamlessly integrates with all major cloud providers) to Dropbox and iCloud<\/span><\/li>\n<li><span style=\"font-family: Helvetica; font-size: 12pt; color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/www.kruptos2.co.uk\/files\/Kruptos2Pro.exe\"><span class=\"s3\">Download\u00a0<\/span><span class=\"s2\">Kruptos 2 Pro\u00a0<\/span><\/a>to encrypt your sensitive files<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: Helvetica; font-size: 12pt;\"><b>What data security <\/b><b>practices<\/b><b> you follow for your mobile-reliant field workers?<\/b> <b>\u00a0Share your thoughts below!<\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile-reliant field workers encounter more data security risks compared to office workers. They connect using a public Wi-Fi (which hackers love to exploit) and consistently rely on the Internet of Things (IoT) to accomplish their duties. It\u2019s always a good idea for any company with mobile field workers to maintain good practices when it comes &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\"> <span class=\"screen-reader-text\">Best Data Security Practices for Mobile-Reliant Field Workers<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":3,"featured_media":2074,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,26],"tags":[64,65,66],"class_list":["post-2071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-security-alerts","tag-data-security","tag-filed-workers","tag-mobile-reliant"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Data Security Practices for Mobile-Reliant Field Workers - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Do you know Mobile-reliant field workers encounter more data security risks than office workers? This post explains Best Data Security Practices for Mobile-Reliant Field Workers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Data Security Practices for Mobile-Reliant Field Workers - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Do you know Mobile-reliant field workers encounter more data security risks than office workers? This post explains Best Data Security Practices for Mobile-Reliant Field Workers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-13T17:51:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-01T10:48:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"642\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dhai Kept\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dhai Kept\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\"},\"author\":{\"name\":\"Dhai Kept\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/586cdf8a7225f0e044d5d72f75ad355a\"},\"headline\":\"Best Data Security Practices for Mobile-Reliant Field Workers\",\"datePublished\":\"2019-06-13T17:51:21+00:00\",\"dateModified\":\"2020-05-01T10:48:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\"},\"wordCount\":656,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg\",\"keywords\":[\"data security\",\"filed workers\",\"mobile-reliant\"],\"articleSection\":[\"Data Protection\",\"Security Alerts\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\",\"name\":\"Best Data Security Practices for Mobile-Reliant Field Workers - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg\",\"datePublished\":\"2019-06-13T17:51:21+00:00\",\"dateModified\":\"2020-05-01T10:48:26+00:00\",\"description\":\"Do you know Mobile-reliant field workers encounter more data security risks than office workers? This post explains Best Data Security Practices for Mobile-Reliant Field Workers.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg\",\"width\":960,\"height\":642,\"caption\":\"data security for Mobile-reliant field workers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Data Security Practices for Mobile-Reliant Field Workers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/586cdf8a7225f0e044d5d72f75ad355a\",\"name\":\"Dhai Kept\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/feb91cad9fbdbc7ad4c5b7d10b3cc951?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/feb91cad9fbdbc7ad4c5b7d10b3cc951?s=96&r=g\",\"caption\":\"Dhai Kept\"},\"description\":\"Dhali Kept is a tech writer who covers how the workforce is being forced to change due to the rapid development of technology. She is also interested in examining how this new reliance on technology has opened companies up to an increasing number of cyber security threats. Through her articles she hopes to provide solutions that can be used by employers and employees to better protect themselves.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/dhali-kept\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Data Security Practices for Mobile-Reliant Field Workers - Kruptos Security Blog","description":"Do you know Mobile-reliant field workers encounter more data security risks than office workers? This post explains Best Data Security Practices for Mobile-Reliant Field Workers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/","og_locale":"en_US","og_type":"article","og_title":"Best Data Security Practices for Mobile-Reliant Field Workers - Kruptos Security Blog","og_description":"Do you know Mobile-reliant field workers encounter more data security risks than office workers? This post explains Best Data Security Practices for Mobile-Reliant Field Workers.","og_url":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-06-13T17:51:21+00:00","article_modified_time":"2020-05-01T10:48:26+00:00","og_image":[{"width":960,"height":642,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg","type":"image\/jpeg"}],"author":"Dhai Kept","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dhai Kept","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/"},"author":{"name":"Dhai Kept","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/586cdf8a7225f0e044d5d72f75ad355a"},"headline":"Best Data Security Practices for Mobile-Reliant Field Workers","datePublished":"2019-06-13T17:51:21+00:00","dateModified":"2020-05-01T10:48:26+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/"},"wordCount":656,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg","keywords":["data security","filed workers","mobile-reliant"],"articleSection":["Data Protection","Security Alerts"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/","url":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/","name":"Best Data Security Practices for Mobile-Reliant Field Workers - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg","datePublished":"2019-06-13T17:51:21+00:00","dateModified":"2020-05-01T10:48:26+00:00","description":"Do you know Mobile-reliant field workers encounter more data security risks than office workers? This post explains Best Data Security Practices for Mobile-Reliant Field Workers.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/06\/Mobile-reliant-field-workers.jpg","width":960,"height":642,"caption":"data security for Mobile-reliant field workers"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/best-data-security-practices-for-field-workers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Best Data Security Practices for Mobile-Reliant Field Workers"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/586cdf8a7225f0e044d5d72f75ad355a","name":"Dhai Kept","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/feb91cad9fbdbc7ad4c5b7d10b3cc951?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/feb91cad9fbdbc7ad4c5b7d10b3cc951?s=96&r=g","caption":"Dhai Kept"},"description":"Dhali Kept is a tech writer who covers how the workforce is being forced to change due to the rapid development of technology. She is also interested in examining how this new reliance on technology has opened companies up to an increasing number of cyber security threats. Through her articles she hopes to provide solutions that can be used by employers and employees to better protect themselves.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/dhali-kept\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=2071"}],"version-history":[{"count":9,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2071\/revisions"}],"predecessor-version":[{"id":2135,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2071\/revisions\/2135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/2074"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=2071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=2071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=2071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}