Mobile security
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must consider when building a mobile security plan.
Top Stories
-
Tip
23 Feb 2024
How to set up Apple Pay for a business
Setting up Apple Pay is a simple process, but IT decision-makers should understand the considerations that come with it and how it varies for organizations of different sizes. Continue Reading
-
Feature
31 Jan 2024
Finding the best mobile hotspot option for remote work
Organizations that allow the use of mobile hotspots for remote work must know how personal hotspots and dedicated hotspot devices differ. Compare these hotspot options. Continue Reading
-
Tip
23 Feb 2024
How to set up Apple Pay for a business
Setting up Apple Pay is a simple process, but IT decision-makers should understand the considerations that come with it and how it varies for organizations of different sizes. Continue Reading
-
Definition
09 Feb 2024
cyberterrorism
Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. Continue Reading
-
Definition
09 Feb 2024
mobile security (wireless security)
Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Continue Reading
-
Definition
06 Feb 2024
dictionary attack
A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary, or word list, as a password. Continue Reading
-
Feature
31 Jan 2024
Finding the best mobile hotspot option for remote work
Organizations that allow the use of mobile hotspots for remote work must know how personal hotspots and dedicated hotspot devices differ. Compare these hotspot options. Continue Reading
-
Definition
23 Jan 2024
BYOD (bring your own device)
BYOD (bring your own device) is a policy that enables employees in an organization to use their personally owned devices for work-related activities. Continue Reading
-
Definition
19 Jan 2024
security incident
A security incident is an event that could indicate that an organization's systems or data have been compromised or that security measures put in place to protect them have failed. Continue Reading
-
Tip
17 Jan 2024
How do personal hotspots work for remote work?
A personal hotspot can be a valuable element of a remote work strategy, but IT teams must understand how they work and what management challenges they present. Continue Reading
-
Definition
19 Dec 2023
unlocked cell phone
An unlocked cell phone is a cellular telephone that can be used with more than one service provider, allowing a user the flexibility to switch between different networks. Continue Reading
-
Tip
08 Dec 2023
Improve mobile hotspot security in 5 steps
Users might not hesitate to connect to a mobile hotspot, but that doesn't mean IT should always allow it. Learn the threats these hotspots pose and how to handle them. Continue Reading
-
Definition
01 Dec 2023
Mitre ATT&CK framework
The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyber adversaries to help organizations strengthen their cybersecurity strategies. Continue Reading
-
Definition
21 Nov 2023
possession factor
The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. Continue Reading
-
Definition
16 Nov 2023
Automated Clearing House fraud (ACH fraud)
ACH fraud is the theft of funds through the U.S. Department of the Treasury's Automated Clearing House financial transaction network. Continue Reading
-
Tip
13 Nov 2023
What should admins know about Microsoft Entra features?
Microsoft Entra combines new and existing cloud-based products and packages them under a new name. Learn how this change affects identity access management in your organization. Continue Reading
-
Definition
03 Nov 2023
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE) is a publicly listed catalog of known security threats. Continue Reading
-
Definition
01 Nov 2023
authentication
Authentication is the process of determining whether someone or something is who or what they say they are. Continue Reading
-
Definition
30 Oct 2023
supercookie
A supercookie is a type of tracking cookie inserted into an HTTP header to collect data about a user's internet browsing history and habits. Continue Reading
-
Definition
18 Oct 2023
Google Authenticator
Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources. Continue Reading
-
Definition
02 Oct 2023
multifactor authentication
Multifactor authentication (MFA) is an account login process that requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction. Continue Reading
-
Definition
29 Sep 2023
cyber insurance
Cyber insurance, also called cyber liability insurance or cybersecurity insurance, is a contract an entity can purchase to help reduce the financial risks associated with doing business online. Continue Reading
-
Tip
25 Sep 2023
Are iPhones more secure than Android devices?
Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android differ, mobile security comes down to management. Continue Reading
-
Definition
05 Sep 2023
email security
Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against unauthorized access and email threats. Continue Reading
-
Definition
23 Aug 2023
network vulnerability scanning
Network vulnerability scanning is the process of inspecting and reporting potential vulnerabilities and security loopholes on a computer, network, web application or other device, including firewalls, switches, routers and wireless access points. Continue Reading
-
Definition
21 Aug 2023
risk analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. Continue Reading
-
Tip
08 Aug 2023
5 steps to ensure HIPAA compliance on mobile devices
IT must implement several measures to comply with HIPAA, and mobile devices can add further complexity to this process. Follow these important steps for mobile HIPAA compliance. Continue Reading
-
Definition
07 Aug 2023
IoT security (internet of things security)
IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT. Continue Reading
-
Tip
25 Jul 2023
5 steps to approach BYOD compliance policies
It can be difficult to ensure BYOD endpoints are compliant because IT can't configure them before they ship to users. Admins must enforce specific policies to make up for this. Continue Reading
-
Definition
18 Jul 2023
cyber extortion
Cyber extortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack. Continue Reading
-
Tip
13 Jun 2023
How to address mobile compliance in a business setting
When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Continue Reading
-
Definition
22 May 2023
API security
Application program interface (API) security refers to policies and procedures that protect APIs against malicious attacks and vulnerabilities. Continue Reading
-
Definition
15 May 2023
remote wipe
Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device. Continue Reading
-
Definition
25 Apr 2023
smishing (SMS phishing)
Smishing -- or Short Message Service (SMS) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages. Continue Reading
-
Definition
19 Apr 2023
firewall
A firewall is a network security device that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of security rules to identify and block threats. Continue Reading
-
Tip
17 Apr 2023
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
-
Tip
14 Apr 2023
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat. Continue Reading
-
Definition
12 Apr 2023
Active Directory Federation Services (AD FS)
Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall. Continue Reading
-
Definition
06 Apr 2023
war driving (access point mapping)
War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks (WLANs) while driving around a city or elsewhere. Continue Reading
-
Tip
04 Apr 2023
How to protect mobile devices from malware in the enterprise
Smartphones can be just as susceptible to cybersecurity threats as desktops, so it's important for organizations to know how to protect their endpoints from mobile malware. Continue Reading
-
Definition
03 Apr 2023
Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP) is an encryption protocol included in the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard for wireless local area networks (WLANs). Continue Reading
-
Definition
17 Mar 2023
bluesnarfing
Bluesnarfing is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. Continue Reading
-
Definition
09 Mar 2023
service set identifier (SSID)
A service set identifier (SSID) is a sequence of characters that uniquely names a Wi-Fi network. Continue Reading
-
Tip
01 Mar 2023
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe. Continue Reading
-
Tip
23 Feb 2023
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe. Continue Reading
-
Definition
21 Feb 2023
mobile malware
Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches. Continue Reading
-
Definition
13 Feb 2023
passwordless authentication
Passwordless authentication is signing into a service without using a password. Continue Reading
-
News
02 Feb 2023
Samsung seeks bigger role as a business mobile provider
Samsung's wide variety of mobile devices, partnerships with software makers and government-grade security are differentiators in the business market, analysts said. Continue Reading
-
Definition
16 Dec 2022
GPS jamming
GPS jamming is the act of using a frequency transmitting device to block or interfere with radio communications. Continue Reading
-
News
27 Sep 2022
Jamf to acquire ZecOps to bolster iOS security
Jamf will pay an undisclosed sum for ZecOps, which logs activity on iOS devices to find potential attacks. The companies expect the deal to close by 2023. Continue Reading
-
News
23 Sep 2022
Microsoft focuses on remote security with Windows 11 update
Microsoft's Windows 11 2022 Update includes features for protecting sensitive corporate data and helping remote workers avoid malware and phishing attacks. Continue Reading
-
Tip
25 Aug 2022
Preventing attacks on mobile applications in the enterprise
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks that come with mobile apps and how to mitigate them. Continue Reading
-
Tip
05 Aug 2022
Understanding QR code security issues for enterprise devices
QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Continue Reading
-
Tip
27 Jul 2022
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises. Continue Reading
-
Tip
13 Jul 2022
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace. Continue Reading
-
Feature
13 Jul 2022
8 top digital wallet companies
Digital wallets offer more security and convenience to consumers, with the flexibility to pay from mobile devices. Continue Reading
-
Definition
12 May 2022
consumerization of IT
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes. Continue Reading
-
Definition
12 May 2022
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices. Continue Reading
-
Opinion
26 Apr 2022
How to sideload iOS apps and why it's dangerous
IT professionals should be aware of how to sideload iOS applications and why it might be dangerous and inadvisable to do so. Learn the two most common sideload methods below. Continue Reading
-
Definition
14 Apr 2022
RPC over HTTP
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP. Continue Reading
-
News
17 Mar 2022
Cisco adds ML to Meraki cameras to track objects
Cisco's MV Sense is available as a subscription with Meraki MV cameras. Companies can use the service to count boxes in a warehouse or track equipment on a factory floor. Continue Reading
-
Definition
15 Mar 2022
location-based service (LBS)
A location-based service (LBS) is a software service for mobile device applications that requires knowledge about where the mobile device is geographically located. Continue Reading
-
Feature
14 Mar 2022
The story of mobile phishing through statistics
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy. Continue Reading
-
Definition
11 Mar 2022
Wireless Transport Layer Security (WTLS)
Wireless Transport Layer Security (WTLS) is a security level for the Wireless Application Protocol (WAP), specifically for the applications that use WAP. Continue Reading
-
News
04 Mar 2022
HP brings device management to VR headsets
HP's SaaS product lets businesses using HTC and Pico virtual reality headsets track device locations, push application updates, patch devices and set security policies. Continue Reading
-
Tip
17 Feb 2022
How text message phishing can affect the enterprise
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices. Continue Reading
-
Tip
08 Feb 2022
Protecting mobile devices from text-based phishing
Phishing emails often get IT teams' attention, but text-based phishing is a growing threat. Organizations must understand the risks of mobile phishing and how to prevent it. Continue Reading
-
Tip
04 Jan 2022
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
-
Tip
16 Jul 2021
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither. Continue Reading
-
Tip
14 Jul 2021
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
-
Feature
26 May 2021
The ultimate guide to mobile device security in the workplace
Mobile devices are established as valuable enterprise endpoints, but organizations must take a measured approach and build out a strong security policy before deploying them. Continue Reading
-
Definition
20 May 2021
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms. Continue Reading
-
Tip
11 May 2021
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with multiple ways to steal data. These threats -- from network spoofing to phishing texts -- endanger companies as much as individuals. Continue Reading
-
Feature
30 Apr 2021
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these 7 best practices to manage mobile device and data security. Continue Reading
-
Tip
09 Oct 2020
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below. Continue Reading
-
Tip
29 May 2020
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
-
Answer
21 May 2020
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
Opinion
25 Mar 2020
A look at MTD vendor Zimperium, and their new product suite, MAPS
Zimperium's MAPS provide organizations with a way to protect apps from development to after it hits app stores. Continue Reading
-
Opinion
19 Mar 2020
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
-
News
28 Feb 2020
Microsoft antivirus software for Android, iOS a reflection of the times
The announcement of Microsoft antivirus software Defender on Android and iOS caused some puzzlement, but experts said the move recognizes the current security landscape. Continue Reading
-
Opinion
27 Feb 2020
What’s the deal with Microsoft Defender for Android and iOS?
AV in 2020 on a mobile device sure does sound funny, so what is it really? Continue Reading
-
Tip
13 Feb 2020
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management. Continue Reading
-
Opinion
13 Feb 2020
What did 2019 see for mobile security? More Punycode phishing, and jailbreaking returns
I previously spent several months examining 2018 in depth, so let’s see what the first couple of mobile security reports show for 2019. Continue Reading
-
Opinion
06 Feb 2020
A look at how Lookout integrates with Microsoft, Google, and VMware for unmanaged devices
Working with the likes of Microsoft, Google, and VMware is a coup for Lookout. Continue Reading
-
News
23 Jan 2020
Sophos adds mobile threat defense app to Intercept X line
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features. Continue Reading
-
Opinion
16 Dec 2019
BlackBerry UEM is now in on zero trust, user behavior analytics, and mobile threat defense
A look at BlackBerry Intelligent Security, BlackBerry Enterprise Identity, and CylancePROTECT for Mobile. Continue Reading
-
Answer
21 Nov 2019
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users. Continue Reading
-
Answer
25 Oct 2019
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well. Continue Reading
-
Tip
26 Sep 2019
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Continue Reading
-
Tip
06 Sep 2019
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns. Continue Reading
-
Tip
05 Sep 2019
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors. Continue Reading
-
Tip
22 Aug 2019
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns. Continue Reading
-
Tip
05 Aug 2019
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data. Continue Reading
-
Opinion
16 Jul 2019
iOS 13 and Android Q show mobile OSes handle security, privacy issues better than Windows used to
Apple and Google can lock down their operating systems with much more ease than Windows. This makes our lives easier (most of the time!). Continue Reading
-
Feature
10 Jul 2019
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
-
Tip
02 Jul 2019
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
-
Tip
25 Jun 2019
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security. Continue Reading
-
Answer
19 Jun 2019
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
-
Feature
18 Jun 2019
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
-
Tip
10 Jun 2019
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors. Continue Reading
-
Answer
17 May 2019
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process. Continue Reading
-
News
13 May 2019
New MobileIron zero-trust security platform launches
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords. Continue Reading