Back to overview

How to check your mobile security in five steps

As business process management companies become increasingly mobile, more and more sensitive data is being transferred via mobile devices. Therefore, the issue of mobile security presents an ongoing challenge. After all, as the company grows, so do the risks.

Step 1 – Protect and manage company data, apps, and/or devices centrally
The protection and management of mobile endpoints, as well as business data on devices and during transmission, is essential. Not only is it important for your business, it is also required to comply with the GDPR. Only through mobile device management (MDM) can enterprise apps and/or business content be protected from a variety of threats.

But beware! MDM can also be dangerous. For example, the MDM solution can be hacked, and all devices deleted remotely. This can lead to considerable losses, especially to your bring your own device (BYOD) strategy, resulting in damage claims and distrust in your own IT.

Step 2 – Conduct a compliance check
Only store your business data on devices that fully meet your compliance guidelines and that you trust. This means checking which vendor the devices come from and the device’s integrity. They shouldn’t be rooted or subject to jailbreak. Finally, make sure your devices are always up to date.

Step 3 – Use a mobile threat detection solution
Security risks should not be underestimated. Often people have a false sense of security and put their faith in the security of the terminal operating system. However, there are also dangers lurking outside the device, for example through the device’s Wi-Fi, Bluetooth or USB connections.

Malicious applications can be installed at any time and are often not immediately recognizable. Such applications and exploits can provide access to the device’s microphone and camera and provide information to unwanted visitors. As a result, meetings, business environments and user privacy are no longer protected.

Step 4 – Stop shadow IT and raise awareness
Many employees need everyday mobile access to their files or the ability to send them to their customers. Consequently, they turn to inadequately protected third-party tools like Dropbox or WeTransfer. This can cause great damage and put the company in a position where it is violating regulations. In addition, such third-party tools are subject to data loss, as was the case with Dropbox in 2012: 68 million confidential files were stolen!

There’s also the fact that users often unknowingly give applications access to business data stored on their device. Therefore, it’s important to have data loss prevention on mobile devices as well—without compromising productivity! This is why it’s a good idea to have an appropriate enterprise file sync and share solution. It is also important to incorporate security into employee training, because only by raising awareness of risks can future dangers—especially those that can’t be totally fixed with technology—be better addressed.

Step 5 – Manage risks
A mobile environment can be very expensive. The cost of both the environment itself and its maintenance are not to be underestimated. Therefore, it is important to manage the entire mobile ecosystem from a risk management perspective. By implementing a risk framework, you also get a cost-effective, reliable and targeted solution that ensures compliance with laws and regulations.

It is in the company’s best interest to protect its intellectual property. However, it is also your duty to protect the data and privacy of your customers and users from attacks on mobile devices.

I am at your disposal for an inquiry or consultation.

Samuel Jud

Samuel Jud, Mobile Solution Architect & Consultant