This content is part of the Essential Guide: Mobile endpoint security: What enterprise infosec pros must know now

Essential Guide

Browse Sections

The first steps of understanding mobile security

We live in a very mobile heavy society and many enterprises have mobility at the center of their IT strategy. As such, it can’t help to understand mobile security better and equipping your organization with the security tool kit to defend yourself from harm.

Before setting guards in place, it’s important to first know what you’re fighting again. In a post by Craig Mathias, a principal with Farpoint Group, he explains how mobile security threats appear in many different forms and what steps you can take against them.

A few common risks include mobile malware and viruses, eavesdropping, unauthorized access and physical security. But there are tools that can help prevent becoming a victim of the threats that plague the mobile world.

Cameron McKenzie, editor-in-chief of, highlights five ways to boost security and reduce mobile risks.  One of those methods include authenticate at the application level.

McKenzie writes, “It is sometimes assumed that since the mobile device itself is protected by a four-digit password, and because the user of the device is a trusted employee, the mobile app itself need not employ a subsequent authentication mechanism.”

He argues it’s more than just securing the application on the phone. Organizations should want to authenticate those coming in and ensuring they are, in fact, an employee of your network.

According to McKenize, another way to improve mobile security is by not making your data accessible. In other words, encrypt your local device as no data should ever be stored in an unencrypted format. Other solutions to decrease your mobile risks include securing all communications over the public network, containing the threats and to just not provide mobile functionality at all.

The goal of mobile security is to protect data and unwanted visitors but just as technology advances, mobile threats can grow and evolve alongside. So what do we do about it? TechTarget’s senior reporter Michael Heller argues that the answer lies in understanding the users.

No matter how strong you believe your company’s mobile security is, it never hurts to re-evaluate and adapt accordingly.

App Architecture
Software Quality
Cloud Computing