Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Assessing mobile security woes

The past year has been marked by extreme challenges to enterprise security capabilities, especially due to the relatively new trend of using mobile devices for corporate functions.

johndaleNEW3

Assessing mobile security woes

mobile device management, mdm, mobile application management


The past year has been marked by extreme challenges to enterprise security capabilities, especially because of the relatively new use of mobile devices for corporate functions. Since many businesses are still relatively unversed in the art of mobile device management (MDM) solutions and the security practices apparent in the mobile space, there are many support structures to use for greater success.

MDM, mobile application management (MAM) and mobile device security solutions, especially when used as part of a comprehensive information governance strategy, are the best and more convenient methods of ensuring productive, protected use of personal smartphones and tablets in the office.

Ominous mobile security predictions 
PC World recently predicted that mobile malware will begin to be a bigger threat to enterprise networks than any other singly threat, including hacktivism. According to the news provider, mobile security pitfalls have been trending in an ominous direction, with many companies either struggling to secure their systems or simply neglecting the practices.

When bring your own device (BYOD) is allowed by not supported this increases security challenges and threats substantially. The source explained that mobile malware is proliferating at a much more rapid pace than in the past and that threats are also becoming more complex.

PC World believes that companies will need to be increasingly proactive, intelligent and creative in their security procedures to avoid major data breach disasters. One new type of mobile malware actually locks the smartphone or tablet until the user or business pays a ransom. More advanced attacks will likely strike companies in the coming months.

Top methods for securing devices
Help Net Security recently listed its top 10 tips for enterprises to secure mobile devices, as well as the data and networks accessed through personal smartphones and tablets. According to the source, enterprise executives should require all employees regularly update their device operating systems, and have someone in charge of monitoring these tasks.

Further, the news provider suggested that employees should be warned about several common dangers, including in-app purchases, granting of access rights for apps, poor passwords and the connections used to access the internet. Help Net Security added that data backup is even more important for mobile-enabled enterprises, and recommended companies put a remote-wipe capability in place early on in BYOD deployment.

Recommended Articles for You

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.