Mobile security
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must consider when building a mobile security plan.
Top Stories
-
Tip
08 Nov 2024
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
By- Michael Goad, CDW
-
Tip
25 Oct 2024
Top 7 mobile device management tools to consider
From device security controls to onboarding features, MDM tools offer a wide range of capabilities. IT teams should explore the options to find the software that fits their needs. Continue Reading
By
-
Opinion
19 Mar 2020
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
By- Kyle Johnson, Technology Editor
-
News
28 Feb 2020
Microsoft antivirus software for Android, iOS a reflection of the times
The announcement of Microsoft antivirus software Defender on Android and iOS caused some puzzlement, but experts said the move recognizes the current security landscape. Continue Reading
By- Mike Gleason, News Writer
-
Opinion
27 Feb 2020
What’s the deal with Microsoft Defender for Android and iOS?
AV in 2020 on a mobile device sure does sound funny, so what is it really? Continue Reading
By- Kyle Johnson, Technology Editor
-
Tip
13 Feb 2020
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management. Continue Reading
By- Kyle Johnson, Technology Editor
-
Opinion
13 Feb 2020
What did 2019 see for mobile security? More Punycode phishing, and jailbreaking returns
I previously spent several months examining 2018 in depth, so let’s see what the first couple of mobile security reports show for 2019. Continue Reading
By- Kyle Johnson, Technology Editor
-
Opinion
06 Feb 2020
A look at how Lookout integrates with Microsoft, Google, and VMware for unmanaged devices
Working with the likes of Microsoft, Google, and VMware is a coup for Lookout. Continue Reading
By- Kyle Johnson, Technology Editor
-
News
23 Jan 2020
Sophos adds mobile threat defense app to Intercept X line
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features. Continue Reading
-
Opinion
16 Dec 2019
BlackBerry UEM is now in on zero trust, user behavior analytics, and mobile threat defense
A look at BlackBerry Intelligent Security, BlackBerry Enterprise Identity, and CylancePROTECT for Mobile. Continue Reading
By -
Answer
21 Nov 2019
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users. Continue Reading
-
Answer
25 Oct 2019
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well. Continue Reading
By- Jack Gold, J.Gold Associates, LLC.
-
Tip
26 Sep 2019
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Continue Reading
-
Tip
06 Sep 2019
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns. Continue Reading
-
Tip
05 Sep 2019
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors. Continue Reading
-
Tip
22 Aug 2019
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns. Continue Reading
By -
Tip
05 Aug 2019
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Opinion
16 Jul 2019
iOS 13 and Android Q show mobile OSes handle security, privacy issues better than Windows used to
Apple and Google can lock down their operating systems with much more ease than Windows. This makes our lives easier (most of the time!). Continue Reading
By- Kyle Johnson, Technology Editor
-
Feature
10 Jul 2019
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
By- John Powers, Senior Site Editor
-
Tip
02 Jul 2019
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
By- Jack Gold, J.Gold Associates, LLC.
-
Tip
25 Jun 2019
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
19 Jun 2019
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
By- Jack Gold, J.Gold Associates, LLC.
-
Feature
18 Jun 2019
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
-
Tip
10 Jun 2019
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
17 May 2019
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process. Continue Reading
-
News
13 May 2019
New MobileIron zero-trust security platform launches
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords. Continue Reading
-
Feature
30 Apr 2019
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
-
Opinion
16 Apr 2019
Conditional access (zero trust) is the most important EUC movement since mobile and cloud
How do we put together the “any-any-any” message we’ve been hearing for years? With access policies that take the device, user, app, risks, and other factors into account. Continue Reading
By -
Tip
05 Apr 2019
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
04 Apr 2019
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
By- John Powers, Senior Site Editor
-
Tip
18 Mar 2019
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
By -
Opinion
25 Feb 2019
What we learned about mobile security from real-world mobile threat defense customer data
Malware installs remain low, sideloading is surprisingly high, everyone agrees phishing is a threat, but there’s little consensus on network threats. Continue Reading
By- Kyle Johnson, Technology Editor
- Jack Madden
-
Tip
22 Feb 2019
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services. Continue Reading
-
Opinion
18 Feb 2019
Zimperium mobile threat data shows malware is a worry but still impacts few devices
Zimperium found that the greatest share of mobile threats is device based. Continue Reading
By- Kyle Johnson, Technology Editor
-
Answer
04 Feb 2019
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
28 Jan 2019
Amazon WorkLink aims to simplify secure mobile device access
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups. Continue Reading
-
Answer
25 Jan 2019
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
-
Answer
18 Dec 2018
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
-
Answer
12 Dec 2018
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
Opinion
11 Dec 2018
Wandera mobile security data shows locked-down corporate policies help lessen risk
It’s important to contextualize all the data to ensure everyone understands and doesn’t just try to dunk on one another. Continue Reading
By- Kyle Johnson, Technology Editor
-
Tip
10 Dec 2018
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
-
Opinion
05 Dec 2018
Why identity management matters to mobility engineers
The next phase of your career can be paved by identity and access management. Continue Reading
By -
Opinion
27 Nov 2018
How bad are mobile security threats? Our look at the numbers starts with Google and Lookout
Every vendor or company publishing mobile security data has an angle; let’s ditch that and just look at the numbers. Continue Reading
By- Kyle Johnson, Technology Editor
-
Answer
14 Nov 2018
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Opinion
25 Oct 2018
How to plan your mobile threat defense deployment
Practical advice on how to layer a mobile threat defense solution on top of your EMM, for single purpose, COPE, and BYOD devices. Continue Reading
By -
News
10 Oct 2018
IT must beware Apple DEP issues with authentication
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic. Continue Reading
By -
Tip
05 Oct 2018
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Tip
03 Oct 2018
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Opinion
25 Sep 2018
Intune Win32 app management & more EUC news from Microsoft Ignite 2018
Here are more end user computing announcements that caught our attention at Microsoft Ignite, including Desktop App Assure and new AutoPilot features. Continue Reading
By- Kyle Johnson, Technology Editor
- Jack Madden
-
Opinion
11 Sep 2018
“Workflow” apps are a way to do mobile app security for SaaS
Where MDM isn’t possible, building workflows into other enterprise apps gives us a hook for security and management policies. Continue Reading
By -
Tip
04 Sep 2018
How to avert mobile device security threats
From man-in-the-middle attacks to malware, mobile devices are susceptible to an array of threats. Here's how to prevent them from infiltrating the business. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
30 Aug 2018
Box security gets a boost with built-in Shield
Shield will provide additional security options for Box content. Attendees at BoxWorks consider how this feature could integrate with IT's existing security tools. Continue Reading
By -
Opinion
16 Aug 2018
Mobile threat defense vendors are taking on phishing, a rising concern on mobile devices
The chances of getting malware on your phone are pretty slim, but social media and messaging apps make phishing a mobile threat to be concerned about. Continue Reading
By -
Tip
25 Jul 2018
Combat mobile device security threats at home and abroad
Employees that travel for business face a higher risk of a mobile security breach. Take these steps to ensure that your mobile device fleet is secure. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
03 Jul 2018
How to manage security threats to mobile devices
As mobile device security threats increase, IT administrators should know what they are up against and develop strategies to secure mobile devices from cyber attacks. Continue Reading
-
Tip
02 Jul 2018
How to mitigate EMM security threats
IT often assumes that EMM is inherently secure, but that isn't always the case. Discover strategies to secure an EMM platform from every possible angle. Continue Reading
By -
News
28 Jun 2018
IAM engineer roles require training and flexibility
Looking for an IAM engineer? They may be right under your nose. But training existing or external candidates involves a lot more than just understanding the tech. Continue Reading
By- Alyssa Provazza, Editorial Director
-
Answer
04 Jun 2018
How can AI in mobile technology improve security?
AI can help IT better detect mobile security threats, so determine how to take advantage of this nascent technology. Prep for AI-based systems to enter the mobile security market. Continue Reading
By- Jack Gold, J.Gold Associates, LLC.
-
Opinion
24 May 2018
How IT can prevent mobile phishing attacks
Mobile devices enable users to make crucial security decisions. Here's how IT can obtain more control to prevent phishing attacks from occurring in the first place. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
15 May 2018
What to know before implementing an IAM system
IT administrators have many features to choose from and requirements to meet when looking for an IAM tool. Check these boxes before committing to IAM. Continue Reading
-
Feature
23 Apr 2018
Explore two major user authentication methods
Both biometric and multifactor authentication can provide high levels of security. Before choosing one -- or a combination of both -- learn the pros and cons of these technologies. Continue Reading
By -
Tip
17 Apr 2018
Be prepared to handle a mobile security breach
When it comes to cybersecurity, mobile security often falls by the wayside. Discover these techniques to prepare for a mobile security incident should it affect your organization. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
05 Mar 2018
How can IT reduce smartphone viruses?
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities. Continue Reading
By -
Tip
08 Feb 2018
How to manage multi-factor authentication for Office 365
Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to succeed with their security strategies. Continue Reading
-
Feature
01 Feb 2018
Tighten mobile security for the enterprise with new strategies
It's important to update your organization's mobile security strategy. Stay informed with new security methods, such as biometric authentication and edge gateways. Continue Reading
By -
Tip
03 Jan 2018
How to choose the best identity access management software
Many IAM products flood today's market, with a variety of different features. Prioritize which capabilities are essential to the business before you make a final decision. Continue Reading
-
Feature
12 Oct 2017
What are the biggest mobile device security threats?
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today. Continue Reading
-
News
26 May 2017
Artificial intelligence data privacy issues on the rise
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies. Continue Reading
By- Alyssa Provazza, Editorial Director
-
Tip
31 Mar 2017
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
Tip
21 Sep 2016
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
-
Tip
25 Jan 2016
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading
-
News
14 May 2015
ShareFile steps up security with third-party DLP integration
Citrix ShareFile will allow for third-party DLP integration within its data zones, as IT shops look for a balance between ease of use and security. Continue Reading
By- Alyssa Provazza, Editorial Director
-
Tip
04 Nov 2014
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
-
Opinion
10 Mar 2014
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use. Continue Reading
By -
Tip
20 Dec 2013
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
By -
Tip
27 Mar 2013
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading
By- Lisa Phifer, Core Competence
-
Quiz
28 Nov 2012
Mobile data security quiz: Test your knowledge
Data security approaches have changed since workers have become more mobile. Take this quiz to see how much you know about keeping mobile data safe. Continue Reading
By- Margaret Jones, Executive Editor
-
News
25 Jul 2012
Active Directory deficient for consumerization-era identity management
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough. Continue Reading
By- James Furbush, TechTarget
-
News
13 Jun 2011
Mobile device security demands surpass reality, survey says
It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products. Continue Reading
By- Susan Fogarty, Senior Director
-
Answer
28 Feb 2011
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading
By -
Tip
06 Oct 2010
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdropping and spoofing. Continue Reading
By -
Quiz
15 Apr 2008
Quiz: Mobile Device Security -- Who else can hear me now?
Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone. Test your knowledge of risk areas and compliance rules in this quiz from WhatIs.com. Continue Reading
-
Definition
17 Jul 2007
SMS spam (cell phone spam or short messaging service spam)
SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs that caused the phones to dial emergency numbers. Continue Reading