Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.


Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Click here to hide

MaaS360 by Fiberlink

A Growing Concern: Is my Smartphone Data Secured?

A Growing Concern: Is my Smartphone Data Secured?

by MaaS360 staff | August 03, 2011

After the phone hacking scandal was exposed in UK recently, the question on every phone user’s mind is this: Is my phone being hacked? It has been proven once again that a little negligence on the part of the user can make data vulnerable to attacks. Thus, the security of smartphones and other mobile devices should be a priority of all individual users and enterprises.

This is not the first time that a smartphone or mobile device has been hacked. Stories of smartphone data theft, loss of sensitive social security information or credit card data stored on USB drives have been in the news for some time. There are a host of mobile apps that are available for users to download and install, and some of them can be malicious. Even public Wi-Fi hotspots serve as ideal gateways for malware and cybercriminals. The threats are further multiplied when the smartphone owners use their devices for managing both personal and corporate information. So, what happens if such a mobile device or smartphone falls into the wrong hands? Ouch! It’s a situation that any organization hates to be in.

As an IT administrator, how can you ensure that a lost or stolen mobile device that stores critical and confidential corporate information does not cause a dent to the company’s reputation? Is there a way you can manage and control devices containing sensitive client and corporate data? Can businesses deploy any security measures to protect their smartphone data?

Yes, you can completely control the situation if you are well prepared  and have the device management basics and security practices defined.

  1. Maintain visibility of assets on campus: First and foremost, as an IT administrator it is very important that you know about all devices, both employee owned and corporate owned, residing in the corporate walls. Since an employee can own more than one device, it is important that you know about them all.
  2. Define the minimum different mobile security policies for:
    1. Enforcing complex passwords and changing the default password
    2. Ensuring encryption of essential and sensitive data
    3. Enforcing remediation and auto-quarantine actions to prevent unauthorized access
    4. Identifying jailbroken or rooted devices
    5. Locking or wiping devices remotely in the event of unauthorized access
    6. Tracking lost, stolen or damaged devices
    7. Restricting the use of certain applications
  3. Monitor the applications used by your employees. Since mobile device data security is no longer restricted to emails, it is important that an IT administrator has visibility into and control over applications used by their employees. If an unwanted risky or malicious application is identified, the IT administrator should blacklist the application to ensure the secured and compliant state of the device.
Thus, enterprises can prevent the infiltrators from tampering with their devices by deploying appropriate mobile security policies on their mobile assets. A good mobile device management (MDM) solution  allows an IT administrator to maintain complete visibility of assets, define mobile security policies to maintain the secured and compliant state of devices, and perform appropriate remediation and auto-quarantine actions on any lost, stolen or hacked devices.

In today’s smartphone era, I believe both enterprises and users share equal responsibilities to keep their devices secured. Some important practices that a smartphone owner can follow are:

  1. If you are not using your voicemail service, turn it off.
  2. Change your PIN or password often.
  3. Avoid using important dates in your life as your PIN, e.g., your birthday or anniversary.
  4. Don’t keep simple passwords like 1234, 6789, 5683 (LOVE), 5555, 1111, 0000, etc.
  5. Turn off Wi-Fi and Bluetooth when not using them.
  6. Install third party applications to encrypt your confidential and sensitive information.
  7. Don’t click on untrusted links in your emails or text messages. They may point to malware or a Trojan.
Here is an article describing the smartphone security best practices that every smartphone owner must follow.

Are there any other smartphone security concerns that your organization has? Please share with us in the comment section or send us an email.

, , , , , , ,

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    Three Reasons to Be Concerned About 'Anonymity' Apps ibm.co/1L4Uio6
  • MaaS360 MaaS360 by IBM
    On the blog: Unifying Windows Ecosystem Management with MaaS360 bit.ly/1y4zpVH
  • MaaS360 MaaS360 by IBM
    By the year 2017, close to 50% of employers could require their employees to provide their own device for work: ibm.co/1yChAMO

Most Active Users

Joe Pappano
Donna Lima
Pragati Cha...
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.