Skip to main content
Apr 03, 2013

Top 5 Mobile Security Risks in the BYOD Age

As a growing number of employees participate in the bring your own device (BYOD) movement, serious mobile security considerations are raised for IT and business leaders who are concerned about the protection of corporate data. In this article, we examine the top 5 mobile security risks in the enterprise and steps that can be taken to help mitigate these risks using a mobile application management (MAM) solution. 
  1. Third-party apps. Whenever employees download and install mobile applications onto their personal devices, they often unknowingly install apps infected with malware that can steal information from a user’s device without their knowledge, as noted in a recent ZDNet article. Effective mobile app management solutions can help protect the enterprise and prevent proprietary information from falling into the wrong hands by regularly inspecting devices for security compromises and then proceed accordingly (e.g. app deletion or device wipe).
  2. Stolen or lost devices. One of the greatest concerns that many enterprise IT and business leaders share regarding the BYOD movement is the threat of an employee or an executive having their mobile device lost or stolen, especially those devices that may contain highly sensitive company or customer information. A cloud-based mobile application management program can help allay those concerns by wiping a device clean regardless of who may have obtained the device or where it is physically located.
  3. Disgruntled employees. Unhappy workers who are poised to leave a company also pose a high security risk if they intend to transfer sensitive corporate information to rival organizations. Providing employees with clear guidance on a company’s security policies, including rules against sharing corporate information after termination, is important for liability protection while acting as an effective deterrent in many cases. Cloud-based MAM solutions can remotely wipe or lock personal devices and protect sensitive information from being dispersed.
  4. Public Wi-Fi. Airports, restaurants, hotel lobbies, and other public venues are popular spots for people to access Wi-Fi. But when employees surf unsecured hot spots, they inadvertently expose sensitive corporate data to cyber thieves. MAM programs provide enterprise IT with visibility into the usage of enterprise apps in these settings.
  5. Cyber attacks. Cyber attacks are on the rise this year, leading government and corporate IT teams to keep a close eye out for potential intrusions. IT professionals can use MAM solutions to identify enterprise apps that may be in use by employees on their mobile devices if and when an intrusion should occur and then take appropriate steps to secure those apps and the data that’s contained.


More from the Blog
Feb 24, 2020

Android Cracks and App Hacks – What Is StrandHogg?

StrandHogg is a critical v
Read more
Feb 19, 2020

Four application security themes for 2020

The United States was astonished recently when the Iowa Democratic caucuses vote count failed due to a bad app.
Read more
Feb 05, 2020

Financial Mobile App Vulnerability FAQs

Last year research by Aite Group examined mobile application security vulnerabilities across eight financial services sectors ...
Read more