Skip to main content
Apr 28, 2014

5 Tips for Mobile Data Security

It’s probably no surprise that mobile data security is the biggest challenge facing companies that embrace mobility. Enterprise mobility enables employees to be more productive because they can work from anywhere, at any time, using any device. Despite the productivity gains, this flexibility raises legitimate concerns about security of sensitive corporate data. Securing enterprise apps and data is critical for IT, but implementing mobile data security policies also has to also be convenient for employees. Enterprises have to deploy security measures that make it easy for workers to access the mobile apps they need to do their jobs – or they won’t adopt them. For IT admins, a big part of managing enterprise mobility means securing mobile data and apps to guard against malware and data leakage -- but how? The Entrepreneur offers five tips to help IT/business leaders and employees reduce the security risks inherent in today’s ever-increasing world of BYOD (bring your own device):

1. Deploy an app-centric enterprise mobility management solution

Mobile application management (MAM®) lets IT control which apps can be installed on employees’ devices, and app wrapping provides the granularity to isolate, containerize, and protect corporate data at the app-level. This enables IT to focus on what matters most – enterprise mobile apps and proprietary data.

2. Implement a mobile device management plan

As a back-up to protecting corporate apps and data, adding a mobile device management plan to secure employees’ devices can complement the mobile app management policy, particularly in cases where a device is lost or stolen. Using a device management solution can be difficult in a BYOD environment, however.

3. Develop and enforce stringent mobile policies

Before fully transitioning to a company-wide BYOD program, enterprises should craft mobile policies -- including such things as which devices and apps workers are allowed to use -- and make these policies clear to employees. “Mobile policies should outline how a firm plans to use enterprise mobility capabilities to meet its long-term goals,” notes the author of the Entrepreneur article. “Additionally, corporate leaders should educate workers on how to mitigate the risk of data leaking from their phones.”

4. Think cloud. Think extensible.

Cloud technology allows workers to move data through a safe, organized platform. Because cloud platforms work with existing IT infrastructures, firms don’t have to revamp their IT systems. Additionally, seek an enterprise mobility solution that is extensible, so it can seamlessly connect with your existing IT systems and adapt for the future.

5. Wipe enterprise data from employee devices

This is an important part of mobile data security. When workers leave their firms – or if their devices are lost or stolen – IT should be able to remove any corporate information or apps from their phones. While a complete device-wipe may be necessary in some case, most only require removing just the corporate apps or data within those apps.

Apperian

More from the Blog
Feb 24, 2020

Android Cracks and App Hacks – What Is StrandHogg?

StrandHogg is a critical v
Read more
Feb 19, 2020

Four application security themes for 2020

The United States was astonished recently when the Iowa Democratic caucuses vote count failed due to a bad app.
Read more
Feb 05, 2020

Financial Mobile App Vulnerability FAQs

Last year research by Aite Group examined mobile application security vulnerabilities across eight financial services sectors ...
Read more