For enterprises, securing mobile devices is a continuing challenge as they deploy more mobile applications. In some cases, security risks are overblown; while in others, they are underestimated. Do you want to know some myths about mobile security that IT security people should be aware of? Continue reading to find out what these are.

1. Mobile devices do not need encryption

Surprisingly, a number of companies don’t implement data encryption on mobile devices. If these devices are being used as thin clients only, with enterprise data being stored in the cloud, the need for encryption is not that great. However, more and more mobile devices store contacts lists, photos, price lists, sales notes, and other sensitive information. The localized storage enables field-based personnel to keep working even if the cloud becomes unavailable. For these reasons alone, encryption should be more widely considered.

2. Wearables don’t need to have security practices applied

Wearable devices are just starting to make an introduction into enterprises. In early applications, they are used for things like capturing photos of crime scenes for police report and photos of equipment in the field that needs repair and must be referred to an internal company expert. However, less than 60% of these devices are secured, according to a mobile security report. As more of these devices are deployed for field operations, IT might need to rethink this.

3. It’s fine to skip mobile security evaluations in IT audits

When it comes to mobile devices, organizations tend to focus their mobile security audits on the network and its centralized monitoring and downloads to these devices. They should also focus security audits on employee mobile device practices in the field and on the security measures that are resident on devices themselves.

4. Mobile devices are inherently less secure than desktop devices

Mobile device security doesn’t have to be less robust than the security found on desktops. In some cases, such as the ability to track and shut down mobile devices remotely, mobile devices might even be more secure. Mobile devices also have small data footprints, using the cloud to store data, so they are not like “fat client” laptop counterparts that have hard drives full of data. As a result, less data may be exposed to security breaches on mobile devices.

5. Mobile devices have more security software vulnerabilities

Mobile devices do not have any more software security vulnerabilities than desktop computers. The difference is that mobile devices are in the field, so IT has to enact a centralized method of delivering new security and software patches down to these devices from the network as soon as patches are available.

6. Mobile device don’t need two-factor authentication

Mobile devices are prone to being misplaced or lost, so the additional security sign-in code that goes beyond just user ID and password can help to secure them. It’s advisable for all mobile devices to use two-factor authentication, which require a secret signing code (for example, where you went to high school) as well as a user ID and password for access.

Tags: ,

This entry was posted by Staff Writer on Wednesday, August 17, 2016 at 6:44:11 AM and is filed under Computer Security & Data Protection.

Leave a Response