Skip to main content
Apr 03, 2013

Top 5 Mobile Security Risks in the BYOD Age

As a growing number of employees participate in the bring your own device (BYOD) movement, serious mobile security considerations are raised for IT and business leaders who are concerned about the protection of corporate data. In this article, we examine the top 5 mobile security risks in the enterprise and steps that can be taken to help mitigate these risks using a mobile application management (MAM) solution. 
  1. Third-party apps. Whenever employees download and install mobile applications onto their personal devices, they often unknowingly install apps infected with malware that can steal information from a user’s device without their knowledge, as noted in a recent ZDNet article. Effective mobile app management solutions can help protect the enterprise and prevent proprietary information from falling into the wrong hands by regularly inspecting devices for security compromises and then proceed accordingly (e.g. app deletion or device wipe).
  2. Stolen or lost devices. One of the greatest concerns that many enterprise IT and business leaders share regarding the BYOD movement is the threat of an employee or an executive having their mobile device lost or stolen, especially those devices that may contain highly sensitive company or customer information. A cloud-based mobile application management program can help allay those concerns by wiping a device clean regardless of who may have obtained the device or where it is physically located.
  3. Disgruntled employees. Unhappy workers who are poised to leave a company also pose a high security risk if they intend to transfer sensitive corporate information to rival organizations. Providing employees with clear guidance on a company’s security policies, including rules against sharing corporate information after termination, is important for liability protection while acting as an effective deterrent in many cases. Cloud-based MAM solutions can remotely wipe or lock personal devices and protect sensitive information from being dispersed.
  4. Public Wi-Fi. Airports, restaurants, hotel lobbies, and other public venues are popular spots for people to access Wi-Fi. But when employees surf unsecured hot spots, they inadvertently expose sensitive corporate data to cyber thieves. MAM programs provide enterprise IT with visibility into the usage of enterprise apps in these settings.
  5. Cyber attacks. Cyber attacks are on the rise this year, leading government and corporate IT teams to keep a close eye out for potential intrusions. IT professionals can use MAM solutions to identify enterprise apps that may be in use by employees on their mobile devices if and when an intrusion should occur and then take appropriate steps to secure those apps and the data that’s contained.


More from the Blog
Mar 13, 2018

Latest Revelations Confirm Arxan’s Suspicions of Source of Apple Source Code Leak Issue

In early February news broke
Read more
Jan 11, 2017

Apperian Moving Up and To the Right as Part of Arxan Technologies

A letter from Mark Lorion, President & General Manager of Apperian. Dear Apperian Customers and Partners,
Read more
Dec 27, 2016

Predictions for 2017 - Where is Enterprise Mobility Headed?

The new year is around the corner and as we look back at 2016 it was an exciting year for the enterprise mobility market, ful ...
Read more