Skip to main content
Apr 03, 2013

Top 5 Mobile Security Risks in the BYOD Age

As a growing number of employees participate in the bring your own device (BYOD) movement, serious mobile security considerations are raised for IT and business leaders who are concerned about the protection of corporate data. In this article, we examine the top 5 mobile security risks in the enterprise and steps that can be taken to help mitigate these risks using a mobile application management (MAM) solution. 
  1. Third-party apps. Whenever employees download and install mobile applications onto their personal devices, they often unknowingly install apps infected with malware that can steal information from a user’s device without their knowledge, as noted in a recent ZDNet article. Effective mobile app management solutions can help protect the enterprise and prevent proprietary information from falling into the wrong hands by regularly inspecting devices for security compromises and then proceed accordingly (e.g. app deletion or device wipe).
  2. Stolen or lost devices. One of the greatest concerns that many enterprise IT and business leaders share regarding the BYOD movement is the threat of an employee or an executive having their mobile device lost or stolen, especially those devices that may contain highly sensitive company or customer information. A cloud-based mobile application management program can help allay those concerns by wiping a device clean regardless of who may have obtained the device or where it is physically located.
  3. Disgruntled employees. Unhappy workers who are poised to leave a company also pose a high security risk if they intend to transfer sensitive corporate information to rival organizations. Providing employees with clear guidance on a company’s security policies, including rules against sharing corporate information after termination, is important for liability protection while acting as an effective deterrent in many cases. Cloud-based MAM solutions can remotely wipe or lock personal devices and protect sensitive information from being dispersed.
  4. Public Wi-Fi. Airports, restaurants, hotel lobbies, and other public venues are popular spots for people to access Wi-Fi. But when employees surf unsecured hot spots, they inadvertently expose sensitive corporate data to cyber thieves. MAM programs provide enterprise IT with visibility into the usage of enterprise apps in these settings.
  5. Cyber attacks. Cyber attacks are on the rise this year, leading government and corporate IT teams to keep a close eye out for potential intrusions. IT professionals can use MAM solutions to identify enterprise apps that may be in use by employees on their mobile devices if and when an intrusion should occur and then take appropriate steps to secure those apps and the data that’s contained.

Apperian

More from the Blog
Nov 14, 2018

Securing mobile apps against reverse engineering and hacking [Podcast]

Listen to Alissa Knight interview Ken Jochims about Arxan Technologies and application s
Read more
Oct 25, 2018

Securing Connected Medical Device Apps (Infographic)

Oct 12, 2018

Your Customers Expect Your Mobile App to Work… Always

Don’t let your application protection fall behind OS updates When an organisation builds apps to provide services to its cus ...
Read more