2015 mobile security survival guide

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more.

Mobile security persistently tops the list of most pressing enterprise security concerns. Here's what you need to know about mobile security in 2015.

Security risks and data breaches are growing while the form factors of computing devices shrink—because much enterprise data today is created and consumed on mobile devices. This clearly explains why mobile security persistently tops the list of most pressing enterprise security concerns.

Currently, most of the mobile security in place is in the form of Mobile Devices Management (MDM) tools that provide such capabilities as device asset management, secure browsing, application whitelisting, data loss prevention, mobile VPN, app-level VPN and many more. While most CISOs, CIOs, and security analysts I’ve spoken to conclude that while MDM isn’t an adequate mobile security answer, it’s currently an important part of the mobile defense toolkit, especially in larger enterprises. And, as is often the case with enterprise data security, there are never any easy answers.

Fortunately, the shift to mobile doesn’t mean a shift in mindset for security professionals. In fact, the shift to mobile doesn’t change much of anything at a high level when protecting data and applications. In actuality, all of the same security practices are needed on mobile devices as they always have been on notebooks and desktops and any other computing form factor: user authentication and authorization, encryption, enforcing security policies, and everything else that comes with keeping data secure.

To help you keep your enterprise mobile app access and data secure, we’ve assembled this most recent Mobile Survival Guide, which includes links to some of our most important and informative mobile security articles, as well as five of the core mobile security tenets you should keep in mind when securing enterprise mobile devices.

First: Give users access to devices that can be secured and securely managed.

Look for smartphones and tablets that come with inherent security controls. This includes the ability to find misplaced or stolen phones, cleanse data off the devices, and support the device configurations to a steady standard. Take a good look at how you can secure Android, Apple, BlackBerry, Microsoft, and other mobile platforms within your organization.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
What’s wrong? The new clean desk test
Join the discussion
Our Commenting Policies

    1 Comment
    5 hours ago
    apptifred
    I agree that mobile should be business as usual for CIOs but that really depends on how far they have come in their processes and thinking. 
    The new security world needs to consider the Mobile First paradigm, a world where Internet of Things become a common point of access, data is stored in clouds and data is accessed on BYOD mobile devices. The biggest challenge is that this data is transported on public mobile networks and open WiFi outside the traditional firewall. And the Sony Entertainment hack really shows us that a traditional perimeter security strategy isn't enough. The approach must be securing data and apps outside or inside firewalls, and the data access must be authenticated with something much more secure than a simple password. 
    For security to work in the corporate environment the systems and tools must be designed so that it easier for employees (including c-level management) to do right than to take security breaching shortcuts.