Essential Guide

Manage Learn to apply best practices and optimize your operations.

Tips and tricks for ensuring mobile data security

In the consumerization age, corporate data is in the cloud and on users' smartphones and tablets. The task of safeguarding mobile data falls to IT professionals and users alike.

Introduction

With so many consumer devices accessing enterprise networks, mobile data security has become a top concern in the enterprise.

As an IT administrator, you have many tools at your disposal to secure corporate data, but you'll also need help from users. You could use mobile device management systems to require passcodes and remotely wipe devices when necessary, for example, plus make sure users are educated on how to keep data safe. Some employees might not know about or understand all the security tools that are built into their devices. They also might be unaware of the risks associated with downloading applications.

Check out these tips on mobile data security to learn more about the risks that smartphones and tablets pose to corporate data, what tools you can use to mitigate them and how users can help.

1Mobile data security primer-

Securing corporate data

Mobile devices that carry enterprise data and access corporate networks can be risky in terms of keeping sensitive information safe. It's important to stop corporate data from leaking from users' devices, and there are many tools you can use, including remote wipe, encryption, mobile device management (MDM) software and more.

Tip

Best practices for mobile device security

Improve your mobility strategy with three basic tools for mobile device security: screen protection, encryption and remote wipe. Continue Reading

Tip

Take a bite out of cybercrime

When it comes to protecting smartphones and tablets from malware, IT can't rely on McGruff the Crime Dog; instead, you'll have to take matters into your own hands. Install virus protection on users' devices and educate them about risky downloading practices. Continue Reading

Tip

Train mobile workers to protect their devices and your data

It's important to train users in the arts of device security and data protection so they can help ensure the safety of corporate data. Inform workers about the security features available on their devices, such as location tracking and screen locks. Continue Reading

Tip

Data encryption on-devices and on-the-go

Strong and appropriate mobile data encryption can help users and IT keep sensitive corporate data from leaking. You'll need encryption techniques for data at rest and data in transit. Continue Reading

Tip

Mobile data security and compliance roadblocks

The number of consumer device types in the enterprise makes ensuring mobile data security and compliance difficult. To meet these challenges, IT needs to take steps such as defining a data classification policy and investing in MDM tools. Continue Reading

Tip

Ways to improve mobile data security

In addition to MDM and mobile application management software, other actions that can keep data safe include requiring passwords, encrypting stored data and using remote wipe on lost or stolen devices. Continue Reading

Tip

Endpoint management isn't about device control

Managing endpoints in the bring-your-own-device era takes an attitude adjustment. Focus on enabling and managing access, rather than controlling devices. Continue Reading

Tip

Using a security strategy to protect the network

A mobile data security strategy that includes impact assessment and device discovery can help you protect the corporate network from some of the risks associated with mobile devices. Continue Reading

Tip

How device encryption protects data

Hardware and software encryption on mobile devices is an easy way to stop data from leaking, but not all the smartphone and tablet hardware on the market supports full-device encryption. Continue Reading

Tip

Improving security with ID management

Identity management systems let you control and keep track of who's accessing your network and which services they can use. Continue Reading

2Safeguards for iOS-

Apple security

Apple has a fairly strong reputation for security, but it's still possible for iPhones and iPads to get malware and then infect the enterprise. There are ways that hackers can get past the security features available on the devices. Some users don't even have features such as passcodes and FindMyiPhone enabled, which makes it even easier for data thieves to get the corporate information they want. Find out how Apple has improved security over the years, how your company's data could still leak and what -- if anything -- you can do about it.

Tip

How an iOS virus can infect the enterprise

Workers may not need virus protection for their Apple devices, but if you let them connect their iPhones and iPads to the corporate network, iOS devices can still wreak havoc. Continue Reading

Tip

Is IT powerless against Siri?

The iPhone's Siri voice-recognition service can bypass the device's security features, and there's not much IT can do about it. Continue Reading

Tip

Addressing enterprise iPhone security issues

Apple iPhones have some cracks in their armor, but you can use Exchange ActiveSync, virtual private networks and end-user training to help shore up the devices. Continue Reading

News

Attacks on iOS a matter of when, not if

Despite Apple's sterling reputation when it comes to security, experts say it's only a matter of time before iOS devices are subject to security attacks, and IT pros don't have the right tools to protect against malware and viruses. Continue Reading

News

IPhone 5s Touch ID raises red flags

Touch ID on Apple's iPhone 5s lets users unlock their phones with a fingerprint, but there are concerns over its security and how Apple can use that biometric data. Continue Reading

Tip

Top eight iOS 7 features for IT

The newest version of Apple's operating system has lots of services and features for users, but it also has some promising tools for IT, such as open-in management, an updated MDM protocol and per-app VPN. Continue Reading

3Use your head-

Android security

Compared with Apple, some people think Android gets low marks for security. It's true that Google Play has been host to some malware issues in the past, but Google has added some new security features to the marketplace and the Android operating system. There are also ways that IT can help users keep corporate data safe, such as encouraging workers to use common-sense downloading practices.

Tip

Why Android malware protection is so important

Android applications that are sideloaded onto a device or come from Google Play can have malware, so users need Android malware protection to keep their devices and your networks safe. Continue Reading

Tip

How to improve Android tablet security

Using the built-in security features on Android tablets isn't enough. Consider third-party security applications to bolster security and fight viruses. Continue Reading

Tip

Android security issues

Android security issues, especially those associated with applications, can prevent companies from allowing employees to use Android devices for work. But new versions of the OS address some of the risks. Continue Reading

Tip

Ice Cream Sandwich tackles some mobile data security concerns

Android 4.0 Ice Cream Sandwich brought some enterprise features to devices, such as full-device encryption and a VPN application programming interface. Continue Reading

News

Google Bouncer looks for Android malware

Google Bouncer helps protect the Google Play store from malware-laden apps, but it only adds a thin layer of security. Bouncer isn't a cure-all for other Android security issues. Continue Reading

Answer

How to tell secure Android apps from malware

Encourage users to check the feedback on applications in the Google Play store before they download new apps, and make sure they know the risks associated with sideloading applications that aren't from a trusted marketplace. Continue Reading

Tip

Android mobile application management isn't enough

Android mobile application management can help you control which apps users can run, but you still won't be able to limit Wi-Fi access or lock down devices. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close