Essential Guide

Manage Learn to apply best practices and optimize your operations.

Tips and tricks for ensuring mobile data security

In the consumerization age, corporate data is in the cloud and on users' smartphones and tablets. The task of safeguarding mobile data falls to IT professionals and users alike.


With so many consumer devices accessing enterprise networks, mobile data security has become a top concern in the enterprise.

As an IT administrator, you have many tools at your disposal to secure corporate data, but you'll also need help from users. You could use mobile device management systems to require passcodes and remotely wipe devices when necessary, for example, plus make sure users are educated on how to keep data safe. Some employees might not know about or understand all the security tools that are built into their devices. They also might be unaware of the risks associated with downloading applications.

Check out these tips on mobile data security to learn more about the risks that smartphones and tablets pose to corporate data, what tools you can use to mitigate them and how users can help.

1Mobile data security primer-

Securing corporate data

Mobile devices that carry enterprise data and access corporate networks can be risky in terms of keeping sensitive information safe. It's important to stop corporate data from leaking from users' devices, and there are many tools you can use, including remote wipe, encryption, mobile device management (MDM) software and more.


Best practices for mobile device security

Improve your mobility strategy with three basic tools for mobile device security: screen protection, encryption and remote wipe. Continue Reading


Take a bite out of cybercrime

When it comes to protecting smartphones and tablets from malware, IT can't rely on McGruff the Crime Dog; instead, you'll have to take matters into your own hands. Install virus protection on users' devices and educate them about risky downloading practices. Continue Reading


Train mobile workers to protect their devices and your data

It's important to train users in the arts of device security and data protection so they can help ensure the safety of corporate data. Inform workers about the security features available on their devices, such as location tracking and screen locks. Continue Reading


Data encryption on-devices and on-the-go

Strong and appropriate mobile data encryption can help users and IT keep sensitive corporate data from leaking. You'll need encryption techniques for data at rest and data in transit. Continue Reading


Mobile data security and compliance roadblocks

The number of consumer device types in the enterprise makes ensuring mobile data security and compliance difficult. To meet these challenges, IT needs to take steps such as defining a data classification policy and investing in MDM tools. Continue Reading


Ways to improve mobile data security

In addition to MDM and mobile application management software, other actions that can keep data safe include requiring passwords, encrypting stored data and using remote wipe on lost or stolen devices. Continue Reading


Endpoint management isn't about device control

Managing endpoints in the bring-your-own-device era takes an attitude adjustment. Focus on enabling and managing access, rather than controlling devices. Continue Reading


Using a security strategy to protect the network

A mobile data security strategy that includes impact assessment and device discovery can help you protect the corporate network from some of the risks associated with mobile devices. Continue Reading


How device encryption protects data

Hardware and software encryption on mobile devices is an easy way to stop data from leaking, but not all the smartphone and tablet hardware on the market supports full-device encryption. Continue Reading


Improving security with ID management

Identity management systems let you control and keep track of who's accessing your network and which services they can use. Continue Reading

2Safeguards for iOS-

Apple security

Apple has a fairly strong reputation for security, but it's still possible for iPhones and iPads to get malware and then infect the enterprise. There are ways that hackers can get past the security features available on the devices. Some users don't even have features such as passcodes and FindMyiPhone enabled, which makes it even easier for data thieves to get the corporate information they want. Find out how Apple has improved security over the years, how your company's data could still leak and what -- if anything -- you can do about it.


How an iOS virus can infect the enterprise

Workers may not need virus protection for their Apple devices, but if you let them connect their iPhones and iPads to the corporate network, iOS devices can still wreak havoc. Continue Reading


Is IT powerless against Siri?

The iPhone's Siri voice-recognition service can bypass the device's security features, and there's not much IT can do about it. Continue Reading


Addressing enterprise iPhone security issues

Apple iPhones have some cracks in their armor, but you can use Exchange ActiveSync, virtual private networks and end-user training to help shore up the devices. Continue Reading


Attacks on iOS a matter of when, not if

Despite Apple's sterling reputation when it comes to security, experts say it's only a matter of time before iOS devices are subject to security attacks, and IT pros don't have the right tools to protect against malware and viruses. Continue Reading


IPhone 5s Touch ID raises red flags

Touch ID on Apple's iPhone 5s lets users unlock their phones with a fingerprint, but there are concerns over its security and how Apple can use that biometric data. Continue Reading


Top eight iOS 7 features for IT

The newest version of Apple's operating system has lots of services and features for users, but it also has some promising tools for IT, such as open-in management, an updated MDM protocol and per-app VPN. Continue Reading

3Use your head-

Android security

Compared with Apple, some people think Android gets low marks for security. It's true that Google Play has been host to some malware issues in the past, but Google has added some new security features to the marketplace and the Android operating system. There are also ways that IT can help users keep corporate data safe, such as encouraging workers to use common-sense downloading practices.


Why Android malware protection is so important

Android applications that are sideloaded onto a device or come from Google Play can have malware, so users need Android malware protection to keep their devices and your networks safe. Continue Reading


How to improve Android tablet security

Using the built-in security features on Android tablets isn't enough. Consider third-party security applications to bolster security and fight viruses. Continue Reading


Android security issues

Android security issues, especially those associated with applications, can prevent companies from allowing employees to use Android devices for work. But new versions of the OS address some of the risks. Continue Reading


Ice Cream Sandwich tackles some mobile data security concerns

Android 4.0 Ice Cream Sandwich brought some enterprise features to devices, such as full-device encryption and a VPN application programming interface. Continue Reading


Google Bouncer looks for Android malware

Google Bouncer helps protect the Google Play store from malware-laden apps, but it only adds a thin layer of security. Bouncer isn't a cure-all for other Android security issues. Continue Reading


How to tell secure Android apps from malware

Encourage users to check the feedback on applications in the Google Play store before they download new apps, and make sure they know the risks associated with sideloading applications that aren't from a trusted marketplace. Continue Reading


Android mobile application management isn't enough

Android mobile application management can help you control which apps users can run, but you still won't be able to limit Wi-Fi access or lock down devices. Continue Reading

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Good piece of content. I think while doing online transaction is also very crucial for any users because that is the chance when we give aways our most important information. Excellent piece of work. I always thought that why android is vulnerable to security threats. After reading this and one more article – which actually explain the difference between Android Vs iOS in terms of security measures. iOS security is much stronger than the Android security but it doesn’t mean people who uses android are not safe. There are few things that every user’s need to do keep safe weather it ios or android. Mobile security is really important now because we share lots of data over the internet to even unauthorized and untrustable sources.