Mobile Security Often Overlooked

  • Press
  • Security

Yusuf Richardson
October 30, 2021 167 views

A protected mobile deters any type of data theft or attack.

Mobile Device Security

Cloud and mobile devices have changed our day-to-day work experience. Mobile device use is now a part of the business culture for today’s society. Employees want access to corporate applications and sensitive data at any given time or location.  Whether it is Bring Your Own Device (BYOD), Choose Your Own Device (CYOD), or Corporate-owned Personal Equipment (COPE), the mobile device infrastructure is implemented in almost every organization.

Due to the extensive usage of mobile devices in today’s work environment, the risk of data theft has risen enormously. Threats such as newly discovered mobile malware are spreading via SMS messaging in the U.S. and Canada, using lures about COVID-19 boosters and regulations. The site tells users they need an “Adobe Flash update.” If they click on the subsequent dialog boxes, TangleBot malware installs.

With most business PCs now mobile, portable devices present distinct challenges to network and data security.  Between malicious hackers and inexperienced users, mobile devices are vulnerable to a broad spectrum of attacks.  Potential threats to devices include malicious mobile apps, phishing scams, data leakage, spyware, and unsecured Wi-Fi networks.  Businesses also should account for the possibility of an employee losing a mobile device or the device is stolen. To avoid a security breach, companies should make clear, preventative steps to reduce the risk.

Securing mobile devices requires a multi-layered approach and investment in enterprise solutions. While there are crucial elements to mobile device security, each organization needs to find what best fits its network.


The following are some best mobile device security practices:


  1. Establish, share, and enforce clear policies and processes

Mobile device policies are only as efficient as the organization’s ability to correctly communicate those rules to employees. Mobile device security is precise and understandable.  Various stakeholders should document business device standards, and users should provide their signatures to acknowledge compliance.


  1. Password protection

One of the most basic ways to prevent unauthorized access to a mobile device is to create a strong password.  A common security problem is employees using the same password for their mobile devices, email, and work-related accounts. Employees must create strong, unique passwords and create different passwords for different accounts.  Password should be no less than eight characters and contain at least one unique character, numeric symbol, and capital letter.


  1. Leverage biometrics

Instead of relying only on traditional methods of mobile access security, such as passwords, some organizations are looking to biometrics as a safer option.  A computer uses measurable biological characteristics, such as face recognition, fingerprint, voice, or iris recognition for identification and access.


  1. Avoid public Wi-Fi

Mobile devices are only as secure as the network through which it transmits data. Organizations are required to educate employees about the dangers of using public Wi-Fi networks, which are vulnerable to attacks and can easily breach a device, access the network, and compromise data. The best defense is to encourage intelligent user behavior and prohibit open Wi-Fi networks, no matter the convenience.


  1. Beware of apps

Malicious applications are the fastest-growing threats to mobile devices. When an employee unknowingly downloads one, either for work or personal reasons, it provides unauthorized access to the organization’s network and data. Further reducing this rising threat impacting businesses, businesses can instruct employees about the dangers of downloading unapproved apps or ban employees from downloading certain apps.


  1. Mobile device encryption

Most mobile devices are bundled with a built-in encryption feature. Users need to locate this feature on their devices and enter a password to encrypt their devices. With this method, data is converted into a code that authorized users can only access.


  1. Virtual Private Network

Utilize a virtual private network (VPN) if possible. A VPN extends a private network across a public network. A VPN enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. VPNs’ encryption technology allows remote users and branch offices to access corporate applications and resources securely.

Mobile devices and their data security are based on personal configuration, device platform, cloud-based 3rd party services, and web services. Individuals who utilize their devices to access sensitive company data must continuously educate themselves on potential threats and security practices to adequately secure mobile devices.  Organizations should perform a detailed analysis of risks against all possible known security threats for mobile applications and use findings to form a secure strategy.  In addition, continuous information awareness programs should be adopted by all organizations utilizing mobile devices for business use.

More Stories

  • Another Contract Win

    Zara Ikram
    April 9, 2021

    The Centers for Medicare & Medicaid Services (CMS) awarded to Softrams, LLC a Task Order contract for the development of a modern Medicaid Drug Programs (MDP) suite of products. The Softrams team includes three subcontracting partners.

  • Team working on user journey testing

    User Journey Testing Is A Team Sport

    Murali M
    April 20, 2021

    User Journey is a pivotal customer engagement that must be tested by all team members to allow a complete and accurate picture. Our Human Experience (HX) approach seeks to build engaging and empowering digital services by elevating users in all aspects.

  • Image Credit: Unleash Your Career Break Barriers -unDraw

    Announcing Unleash-ED

    Murali M
    January 13, 2021

    Softrams is teaming up with Teaching for Good to bring an exciting new initiative. Unleash-ED supports forward thinking industry leaders and offers job training and mentoring programs to build skills of the future workforce.