Mobile security
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must consider when building a mobile security plan.
Top Stories
-
Tip
13 Nov 2023
What should admins know about Microsoft Entra features?
Microsoft Entra combines new and existing cloud-based products and packages them under a new name. Learn how this change affects identity access management in your organization. Continue Reading
-
Tip
25 Sep 2023
Are iPhones more secure than Android devices?
Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android differ, mobile security comes down to management. Continue Reading
-
Tip
08 Aug 2023
5 steps to ensure HIPAA compliance on mobile devices
IT must implement several measures to comply with HIPAA, and mobile devices can add further complexity to this process. Follow these important steps for mobile HIPAA compliance. Continue Reading
-
Tip
25 Jul 2023
5 steps to approach BYOD compliance policies
It can be difficult to ensure BYOD endpoints are compliant because IT can't configure them before they ship to users. Admins must enforce specific policies to make up for this. Continue Reading
-
Tip
13 Jun 2023
How to address mobile compliance in a business setting
When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Continue Reading
-
Tip
17 Apr 2023
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
-
Tip
14 Apr 2023
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat. Continue Reading
-
Tip
04 Apr 2023
How to protect mobile devices from malware in the enterprise
Smartphones can be just as susceptible to cybersecurity threats as desktops, so it's important for organizations to know how to protect their endpoints from mobile malware. Continue Reading
-
Tip
01 Mar 2023
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe. Continue Reading
-
Tip
23 Feb 2023
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe. Continue Reading
-
News
02 Feb 2023
Samsung seeks bigger role as a business mobile provider
Samsung's wide variety of mobile devices, partnerships with software makers and government-grade security are differentiators in the business market, analysts said. Continue Reading
-
News
27 Sep 2022
Jamf to acquire ZecOps to bolster iOS security
Jamf will pay an undisclosed sum for ZecOps, which logs activity on iOS devices to find potential attacks. The companies expect the deal to close by 2023. Continue Reading
-
News
23 Sep 2022
Microsoft focuses on remote security with Windows 11 update
Microsoft's Windows 11 2022 Update includes features for protecting sensitive corporate data and helping remote workers avoid malware and phishing attacks. Continue Reading
-
Tip
25 Aug 2022
Preventing attacks on mobile applications in the enterprise
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks that come with mobile apps and how to mitigate them. Continue Reading
-
Tip
05 Aug 2022
Understanding QR code security issues for enterprise devices
QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Continue Reading
-
Tip
27 Jul 2022
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises. Continue Reading
-
Tip
13 Jul 2022
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace. Continue Reading
-
Feature
13 Jul 2022
8 top digital wallet companies
Digital wallets offer more security and convenience to consumers, with the flexibility to pay from mobile devices. Continue Reading
-
Opinion
26 Apr 2022
How to sideload iOS apps and why it's dangerous
IT professionals should be aware of how to sideload iOS applications and why it might be dangerous and inadvisable to do so. Learn the two most common sideload methods below. Continue Reading
-
News
17 Mar 2022
Cisco adds ML to Meraki cameras to track objects
Cisco's MV Sense is available as a subscription with Meraki MV cameras. Companies can use the service to count boxes in a warehouse or track equipment on a factory floor. Continue Reading
-
Feature
14 Mar 2022
The story of mobile phishing through statistics
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy. Continue Reading
-
News
04 Mar 2022
HP brings device management to VR headsets
HP's SaaS product lets businesses using HTC and Pico virtual reality headsets track device locations, push application updates, patch devices and set security policies. Continue Reading
-
Tip
17 Feb 2022
How text message phishing can affect the enterprise
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices. Continue Reading
-
Tip
08 Feb 2022
Protecting mobile devices from text-based phishing
Phishing emails often get IT teams' attention, but text-based phishing is a growing threat. Organizations must understand the risks of mobile phishing and how to prevent it. Continue Reading
-
Tip
04 Jan 2022
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
-
Tip
16 Jul 2021
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither. Continue Reading
-
Tip
14 Jul 2021
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
-
Feature
26 May 2021
The ultimate guide to mobile device security in the workplace
Mobile devices are established as valuable enterprise endpoints, but organizations must take a measured approach and build out a strong security policy before deploying them. Continue Reading
-
Tip
11 May 2021
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with multiple ways to steal data. These threats -- from network spoofing to phishing texts -- endanger companies as much as individuals. Continue Reading
-
Feature
30 Apr 2021
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these 7 best practices to manage mobile device and data security. Continue Reading
-
Tip
09 Oct 2020
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below. Continue Reading
-
Tip
29 May 2020
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
-
Answer
21 May 2020
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
Opinion
25 Mar 2020
A look at MTD vendor Zimperium, and their new product suite, MAPS
Zimperium's MAPS provide organizations with a way to protect apps from development to after it hits app stores. Continue Reading
-
Opinion
19 Mar 2020
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
-
News
28 Feb 2020
Microsoft antivirus software for Android, iOS a reflection of the times
The announcement of Microsoft antivirus software Defender on Android and iOS caused some puzzlement, but experts said the move recognizes the current security landscape. Continue Reading
-
Opinion
27 Feb 2020
What’s the deal with Microsoft Defender for Android and iOS?
AV in 2020 on a mobile device sure does sound funny, so what is it really? Continue Reading
-
Tip
13 Feb 2020
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management. Continue Reading
-
Opinion
13 Feb 2020
What did 2019 see for mobile security? More Punycode phishing, and jailbreaking returns
I previously spent several months examining 2018 in depth, so let’s see what the first couple of mobile security reports show for 2019. Continue Reading
-
Opinion
06 Feb 2020
A look at how Lookout integrates with Microsoft, Google, and VMware for unmanaged devices
Working with the likes of Microsoft, Google, and VMware is a coup for Lookout. Continue Reading
-
News
23 Jan 2020
Sophos adds mobile threat defense app to Intercept X line
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features. Continue Reading
-
Opinion
16 Dec 2019
BlackBerry UEM is now in on zero trust, user behavior analytics, and mobile threat defense
A look at BlackBerry Intelligent Security, BlackBerry Enterprise Identity, and CylancePROTECT for Mobile. Continue Reading
-
Answer
21 Nov 2019
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users. Continue Reading
-
Answer
25 Oct 2019
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well. Continue Reading
-
Tip
26 Sep 2019
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Continue Reading
-
Tip
06 Sep 2019
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns. Continue Reading
-
Tip
05 Sep 2019
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors. Continue Reading
-
Tip
22 Aug 2019
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns. Continue Reading
-
Tip
05 Aug 2019
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data. Continue Reading
-
Opinion
16 Jul 2019
iOS 13 and Android Q show mobile OSes handle security, privacy issues better than Windows used to
Apple and Google can lock down their operating systems with much more ease than Windows. This makes our lives easier (most of the time!). Continue Reading
-
Feature
10 Jul 2019
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
-
Tip
02 Jul 2019
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
-
Tip
25 Jun 2019
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security. Continue Reading
-
Answer
19 Jun 2019
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
-
Feature
18 Jun 2019
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
-
Tip
10 Jun 2019
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors. Continue Reading
-
Answer
17 May 2019
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process. Continue Reading
-
News
13 May 2019
New MobileIron zero-trust security platform launches
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords. Continue Reading
-
Feature
30 Apr 2019
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
-
Opinion
16 Apr 2019
Conditional access (zero trust) is the most important EUC movement since mobile and cloud
How do we put together the “any-any-any” message we’ve been hearing for years? With access policies that take the device, user, app, risks, and other factors into account. Continue Reading
-
Tip
05 Apr 2019
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability. Continue Reading
-
Feature
04 Apr 2019
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
-
Tip
18 Mar 2019
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
-
Opinion
25 Feb 2019
What we learned about mobile security from real-world mobile threat defense customer data
Malware installs remain low, sideloading is surprisingly high, everyone agrees phishing is a threat, but there’s little consensus on network threats. Continue Reading
-
Tip
22 Feb 2019
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services. Continue Reading
-
Opinion
18 Feb 2019
Zimperium mobile threat data shows malware is a worry but still impacts few devices
Zimperium found that the greatest share of mobile threats is device based. Continue Reading
-
Answer
04 Feb 2019
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
-
News
28 Jan 2019
Amazon WorkLink aims to simplify secure mobile device access
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups. Continue Reading
-
Answer
25 Jan 2019
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
-
Answer
18 Dec 2018
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
-
Answer
12 Dec 2018
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
Opinion
11 Dec 2018
Wandera mobile security data shows locked-down corporate policies help lessen risk
It’s important to contextualize all the data to ensure everyone understands and doesn’t just try to dunk on one another. Continue Reading
-
Tip
10 Dec 2018
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
-
Opinion
05 Dec 2018
Why identity management matters to mobility engineers
The next phase of your career can be paved by identity and access management. Continue Reading
-
Opinion
27 Nov 2018
How bad are mobile security threats? Our look at the numbers starts with Google and Lookout
Every vendor or company publishing mobile security data has an angle; let’s ditch that and just look at the numbers. Continue Reading
-
Answer
14 Nov 2018
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
-
Opinion
25 Oct 2018
How to plan your mobile threat defense deployment
Practical advice on how to layer a mobile threat defense solution on top of your EMM, for single purpose, COPE, and BYOD devices. Continue Reading
-
News
10 Oct 2018
IT must beware Apple DEP issues with authentication
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic. Continue Reading
-
Tip
05 Oct 2018
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
-
Tip
03 Oct 2018
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system. Continue Reading
-
Opinion
25 Sep 2018
Intune Win32 app management & more EUC news from Microsoft Ignite 2018
Here are more end user computing announcements that caught our attention at Microsoft Ignite, including Desktop App Assure and new AutoPilot features. Continue Reading
-
Opinion
11 Sep 2018
“Workflow” apps are a way to do mobile app security for SaaS
Where MDM isn’t possible, building workflows into other enterprise apps gives us a hook for security and management policies. Continue Reading
-
Tip
04 Sep 2018
How to avert mobile device security threats
From man-in-the-middle attacks to malware, mobile devices are susceptible to an array of threats. Here's how to prevent them from infiltrating the business. Continue Reading
-
News
30 Aug 2018
Box security gets a boost with built-in Shield
Shield will provide additional security options for Box content. Attendees at BoxWorks consider how this feature could integrate with IT's existing security tools. Continue Reading
-
Opinion
16 Aug 2018
Mobile threat defense vendors are taking on phishing, a rising concern on mobile devices
The chances of getting malware on your phone are pretty slim, but social media and messaging apps make phishing a mobile threat to be concerned about. Continue Reading
-
Tip
25 Jul 2018
Combat mobile device security threats at home and abroad
Employees that travel for business face a higher risk of a mobile security breach. Take these steps to ensure that your mobile device fleet is secure. Continue Reading
-
Feature
03 Jul 2018
How to manage security threats to mobile devices
As mobile device security threats increase, IT administrators should know what they are up against and develop strategies to secure mobile devices from cyber attacks. Continue Reading
-
Tip
02 Jul 2018
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle. Continue Reading
-
News
28 Jun 2018
IAM engineer roles require training and flexibility
Looking for an IAM engineer? They may be right under your nose. But training existing or external candidates involves a lot more than just understanding the tech. Continue Reading
-
Answer
04 Jun 2018
How can AI in mobile technology improve security?
AI can help IT better detect mobile security threats, so determine how to take advantage of this nascent technology. Prep for AI-based systems to enter the mobile security market. Continue Reading
-
Opinion
24 May 2018
How IT can prevent mobile phishing attacks
Mobile devices enable users to make crucial security decisions. Here's how IT can obtain more control to prevent phishing attacks from occurring in the first place. Continue Reading
-
Feature
15 May 2018
What to know before implementing an IAM system
IT administrators have many features to choose from and requirements to meet when looking for an IAM tool. Check these boxes before committing to IAM. Continue Reading
-
Feature
23 Apr 2018
Explore two major user authentication methods
Both biometric and multifactor authentication can provide high levels of security. Before choosing one -- or a combination of both -- learn the pros and cons of these technologies. Continue Reading
-
Tip
17 Apr 2018
Be prepared to handle a mobile security breach
When it comes to cybersecurity, mobile security often falls by the wayside. Discover these techniques to prepare for a mobile security incident should it affect your organization. Continue Reading
-
Answer
05 Mar 2018
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities. Continue Reading
-
Tip
08 Feb 2018
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies. Continue Reading
-
Feature
01 Feb 2018
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways. Continue Reading
-
Tip
03 Jan 2018
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision. Continue Reading
-
Feature
12 Oct 2017
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today. Continue Reading
-
News
26 May 2017
Artificial intelligence data privacy issues on the rise
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies. Continue Reading
-
Tip
31 Mar 2017
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
Tip
21 Sep 2016
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading