FotolEdhar - Fotolia

Get started Bring yourself up to speed with our introductory content.

Top five tips for mobile computing 2015

IT admins focused on mobile security in 2015, flocking to Android for Work and BYOD data access articles. They also read about in-house app development.

Looking at the most popular tips for mobile computing 2015, one thing is clear: Security issues were at the top of almost every IT administrator's mind.

Almost all of our top-viewed articles dealt with some sort of security or privacy concern, from guest wireless network access to the battle against mobile data loss. Android for Work was also a big draw, as IT administrators sought to learn more about Google's plan to make its mobile operating system safer.

Take a look back at the year that was and pick up a few tips on BYOD data access and mobile app development.

5. A look at in-house app development

The only article on this list not about security explored how to build and deploy mobile applications. In-house applications allow developers to build apps with maximum customization. Unfortunately, the practice is expensive and time consuming. To simplify the process, developers should standardize by creating a style guide and selecting a universal development environment, such as HTML5.

Once this foundation is in place, admins must decide whether or not they will push the apps to their users or if users will download the apps themselves through an app store. IT also needs to monitor performance to make sure the apps live up to quality standards.

4. Find a balance with BYOD data access

When it comes to accessing corporate data on personal devices, it's IT's job to strike a balance between accessibility and security.

Mobile content management (MCM) gives IT control over the types of data users can access on their mobile devices and lets IT set appropriate encryption levels. With MCM, users should be able to store both work and personal data in the same place and edit documents on any device.

3. How to prevent mobile data loss

Malicious threats lay around every mobile corner, so naturally, readers wanted to learn about different tools that stop mobile data loss.

Just about everybody has an internet-ready device in their pockets, which only adds to the chaos of mobile security.

The first step is to tackle malware head-on with policies for mobile device usage and antimalware software. Also use mobile device management (MDM) to enforce policies across all users' devices. And with dual persona technology, admins can lock corporate apps and data in their own boxes that users cannot take anything out of or put anything into.

Other options include housing apps and data in the data center with VDI, limiting which apps can share content and combining MDM and mobile application management (MAM) to enforce containerization.

2. Explore key features of Android for Work

When Google introduced Android for Work earlier this year, IT admins wanted to know more about its profiles and productivity features.

Work profiles got a lot of attention because they allow IT to create containers that separate corporate and personal data on users' devices. With these containers in place, IT can safely wipe corporate data from devices without removing any personal information. In addition, containerization prevents work-related apps from interacting with any personal apps and data on the device.

Android for Work's productivity features, which give users access to apps such as Google Slides and Google Docs, are also important.

1. How to manage guest wireless network access

Just about everybody has an Internet-ready device in their pockets, which means managing guest network access is a major challenge IT needs to address.

Admins should create policies that treat guests as their own class of user, with restrictions on what they can and can't access on the network, such as certain websites, printers, and so on. IT must also change the security keys on a per-user, per-session basis, and those credentials should expire after a specific time so guests cannot linger on the network. Before any guests can access the network, IT should force them to read and accept the company's policies.

Next Steps

What to expect from mobility in 2016

Compare MAM versus MDM

The future of enterprise mobility suites

Dig Deeper on Enterprise mobile security