Mobile Security

As more devices become connected to the internet or other devices, organizations face an exponential increase in endpoints that must be secured.

Protect Your Business with Mobile Security

Security threats are relentless and coming from more areas. The Internet of Things (IoT) means that any device that can be connected to the internet or other devices will be connected and organizations will have to deal with an exponential rise in the number of endpoints that need to be secured.
The consequences of a breach can be disastrous with theft of corporate secrets, customer data and other material. Costs to identify breaches, strengthen security, respond to potential lawsuits from data exposed by cyber criminals and regulatory oversight are staggering. Enterprises must proactively respond with programs that combine automation and educational measures to avoid breaches.
While Telecom Expense Management (TEM) and Technology Expense Management don’t usually directly address security threats, Managed Mobility Services and many other areas that ETMA members deal with do have areas that relate to security. For example, IoT provides opportunities for the TEM and MMS market to help with efforts to manage procurement of devices, track inventory, ensure that retired devices are wiped clean, enforce corporate mobile policy, and report on network activity.

Best Practices for Mobile Security

MDM solutions can control, secure, manage and monitor all employee mobile devices. Below are eight best practices to help prevent threats from mobile devices:

  1. Ensure that devices do not use unsecured Wi-Fi networks to connect to the corporate network through public Wi-Fi hotspots.
  2. Segregate the network used by personal devices from the corporate network and critical business data.
  3. Safeguard the corporate network with role-based device usage permissions and customizable access to corporate accounts. Where remote access is granted, require two factor authentification to connect to the corporate network.
  4. Prevent downloading unapproved apps from unreliable third-party sources and only allow downloads from trusted sources, such as a corporate store, the iOS App store, or Google Play.
  5. Detect and report high risk and non compliant devices Easily discover jail-broken and rooted devices within your organization’s network.
  6. In case of loss/theft, educate employees to report it quickly and have employees to geographically locate the device and wipe its data to ensure corporate data safety.
  7. Get employees to understand the dangers of “phishing” emails with links, “spearphish” personalized emails, or other dangerous e-mails sent to employees.
  8. Verify all phone calls before taking action that could expose network to hackers.

The list above is a starting point. Threats keep changing and ETMA will expand its coverage of security as well.

Other Technologies

ETMA members collaborate to offer software and services for managing diverse technologies from expenses to IoT and AI.

Industry Knowledge

Scroll to Top