Enterprise Mobile Device Security | Vox Mobile

By Patricia Ross
Topics: Mobile Security

Enterprise Mobile Device Security: Preventing Common Threats

It’s no surprise to anyone that mobile device security threats are on the rise. With the vast majority of personal devices routinely accessing corporate data, the prevalence of sensitive information ending up in the wrong hands is higher than ever. And so are the stakes with $4.24 million as the average cost of a corporate data breach.

In this blog, we uncover the most common enterprise mobile device security threats and the best ways to mitigate them.

1.Social engineering

Mobile users are at the greatest risk of falling for phishing scams because of the way many mobile email clients display only a sender’s name, making it especially easy to spoof messages and trick a person into thinking an email is from someone they know or trust. Providing mobile-specific training can keep your employees from becoming the next phishing victims.

2. Poor Password Habits

Reusing passwords or having your password as “Password” isn’t a good idea. Yet, many companies put themselves at risk with passwords that are too complicated to remember or input. “Requiring your sales team to update Salesforce during a meeting, using a device with a 10-character password, may seem secure. The outcome is your business data integrity goes out the window,” explains Rob Seemann Vox Mobile’s Senior Vice President Product Strategy & Innovation. When it comes to passwords you need to, “Balance everything to make sure you’re comfortable with the risk without hampering productivity.”

3. Out-of-Date Operating Systems

Operating system updates only protect your organization if the devices used to access your systems are kept up to date at all times. “Companies have been using mobile devices for decades and some of those devices are pretty old and are no longer supported by the manufacturer,” says Tristan Sitz, Vox Mobile’s Technical Presales Engineer. “These create security gaps. You need to keep these out of your environment.”

4. Ransomware

Mobile ransomware is one of the most damaging types of malware since it encrypts a device then requires a ransom payment for the decryption key to restore access to the encrypted data. Sitz recommends using an enterprise mobile security management solution such as an enterprise mobility management (EMM) platform with malware security that can detect malware and automatically quarantine the infected device.

5. Data Leakage

Data leaks can be unintentional, such as a user accidentally attaching a work document to a personal email or more nefarious such as hostile mobile apps. For either case, your mobile security solution can plug those holes. Ensuring all devices accessing your network are enrolled in your mobile device management (MDM) platform, containerizing your company data separate from personal data, and implementing strict identity management protocols can help you avoid data from going rogue.

6. Unsecured Wi-Fi

Free Wi-Fi can cost you if your sensitive data is compromised. This also goes for improperly secured home networks used by remote workers. Sitz strongly suggests enforcing a Wi-Fi policy that clearly says all devices must be enrolled in your MDM before they can connect to Wi-Fi. It would also be good to inform your employees of the risks they face using free Wi-Fi.

7. Network Spoofing

Spoofed networks play on the appeal of free Wi-Fi with names like “Airport Wi-Fi” but are actually fake access points. Some require users to create an account and password. Counting on people to re-use passwords, hackers gain access to a variety of services and sometimes even the user’s device. Best to never share personal information or re-use passwords. Better yet, treat all unknown networks as threats and create MDM policies to avoid connections.

8. Lost or Stolen Mobile Devices

Lost and stolen devices are becoming more common and more of a threat to your business. Ensuring your employees know what to do when their device is lost or stolen is the first step. Enrolled devices can be remotely wiped or locked down using your enterprise mobile security management platform. You can also lock down or wipe just the corporate side of personal devices, enabling your users to still access the their information.

Better Protection Partner

There’s a lot you can do to protect mobile devices within your organization. Your limitations depend on how complex, how much effort and how much traffic your network can handle. “The Vox Mobile team helps our customers determine their must-haves to meet the specific security standards of their use cases and industry,” says Seemann. Sitz adds “A lot of companies believe they want the mobile devices they use to be as secure as possible. That can lead to an overwhelming number of help desk calls that can bring business to a standstill.”

Vox Mobile can help you balance usability with security, creating enterprise mobile security management policies that work for your business, use case and role, and find what works best for you. Our team of mobility experts are certified in all Gartner-leading mobile security solutions and can work with you to determine which is best for your business. We can also help you set policies that optimize your enterprise mobile device security and success.