With so many consumer devices accessing enterprise networks, mobile data security has become a top concern in the enterprise.
As an IT administrator, you have many tools at your disposal to secure corporate data, but you'll also need help from users. You could use mobile device management systems to require passcodes and remotely wipe devices when necessary, for example, plus make sure users are educated on how to keep data safe. Some employees might not know about or understand all the security tools that are built into their devices. They also might be unaware of the risks associated with downloading applications.
Check out these tips on mobile data security to learn more about the risks that smartphones and tablets pose to corporate data, what tools you can use to mitigate them and how users can help.
1Mobile data security primer-
Securing corporate data
Mobile devices that carry enterprise data and access corporate networks can be risky in terms of keeping sensitive information safe. It's important to stop corporate data from leaking from users' devices, and there are many tools you can use, including remote wipe, encryption, mobile device management (MDM) software and more.
Improve your mobility strategy with three basic tools for mobile device security: screen protection, encryption and remote wipe. Continue Reading
When it comes to protecting smartphones and tablets from malware, IT can't rely on McGruff the Crime Dog; instead, you'll have to take matters into your own hands. Install virus protection on users' devices and educate them about risky downloading practices. Continue Reading
It's important to train users in the arts of device security and data protection so they can help ensure the safety of corporate data. Inform workers about the security features available on their devices, such as location tracking and screen locks. Continue Reading
Strong and appropriate mobile data encryption can help users and IT keep sensitive corporate data from leaking. You'll need encryption techniques for data at rest and data in transit. Continue Reading
The number of consumer device types in the enterprise makes ensuring mobile data security and compliance difficult. To meet these challenges, IT needs to take steps such as defining a data classification policy and investing in MDM tools. Continue Reading
In addition to MDM and mobile application management software, other actions that can keep data safe include requiring passwords, encrypting stored data and using remote wipe on lost or stolen devices. Continue Reading
Managing endpoints in the bring-your-own-device era takes an attitude adjustment. Focus on enabling and managing access, rather than controlling devices. Continue Reading
A mobile data security strategy that includes impact assessment and device discovery can help you protect the corporate network from some of the risks associated with mobile devices. Continue Reading
Hardware and software encryption on mobile devices is an easy way to stop data from leaking, but not all the smartphone and tablet hardware on the market supports full-device encryption. Continue Reading
Identity management systems let you control and keep track of who's accessing your network and which services they can use. Continue Reading
2Safeguards for iOS-
Apple has a fairly strong reputation for security, but it's still possible for iPhones and iPads to get malware and then infect the enterprise. There are ways that hackers can get past the security features available on the devices. Some users don't even have features such as passcodes and FindMyiPhone enabled, which makes it even easier for data thieves to get the corporate information they want. Find out how Apple has improved security over the years, how your company's data could still leak and what -- if anything -- you can do about it.
Workers may not need virus protection for their Apple devices, but if you let them connect their iPhones and iPads to the corporate network, iOS devices can still wreak havoc. Continue Reading
The iPhone's Siri voice-recognition service can bypass the device's security features, and there's not much IT can do about it. Continue Reading
Apple iPhones have some cracks in their armor, but you can use Exchange ActiveSync, virtual private networks and end-user training to help shore up the devices. Continue Reading
Despite Apple's sterling reputation when it comes to security, experts say it's only a matter of time before iOS devices are subject to security attacks, and IT pros don't have the right tools to protect against malware and viruses. Continue Reading
Touch ID on Apple's iPhone 5s lets users unlock their phones with a fingerprint, but there are concerns over its security and how Apple can use that biometric data. Continue Reading
The newest version of Apple's operating system has lots of services and features for users, but it also has some promising tools for IT, such as open-in management, an updated MDM protocol and per-app VPN. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
3Use your head-
Compared with Apple, some people think Android gets low marks for security. It's true that Google Play has been host to some malware issues in the past, but Google has added some new security features to the marketplace and the Android operating system. There are also ways that IT can help users keep corporate data safe, such as encouraging workers to use common-sense downloading practices.
Android applications that are sideloaded onto a device or come from Google Play can have malware, so users need Android malware protection to keep their devices and your networks safe. Continue Reading
Using the built-in security features on Android tablets isn't enough. Consider third-party security applications to bolster security and fight viruses. Continue Reading
Android security issues, especially those associated with applications, can prevent companies from allowing employees to use Android devices for work. But new versions of the OS address some of the risks. Continue Reading
Android 4.0 Ice Cream Sandwich brought some enterprise features to devices, such as full-device encryption and a VPN application programming interface. Continue Reading
Google Bouncer helps protect the Google Play store from malware-laden apps, but it only adds a thin layer of security. Bouncer isn't a cure-all for other Android security issues. Continue Reading
Encourage users to check the feedback on applications in the Google Play store before they download new apps, and make sure they know the risks associated with sideloading applications that aren't from a trusted marketplace. Continue Reading
Android mobile application management can help you control which apps users can run, but you still won't be able to limit Wi-Fi access or lock down devices. Continue Reading