Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones.
More and more users and businesses employ smartphones as communication tools, but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
-3rd Party Apps
-Operting System Vulnerabilites
-Recording or Listening to conversations
-User Tracking (GPS)
There are litany of controls that organisations can employ:
-Force Encryption of data at rest.
-Force secure connectivity on unsecured public networks
-Confirm unauthorized mobile devices do not have access to corporate LAN
-Confirm mobile user spending is in-line with mobile security policy
-Implement over-the-air decommissioning of lost or stolen devices
-Set the device to auto-lock
-Set limit for unauthorized login attempts
-Handheld devices should be enterprise property
-Before an employee departs, obtain device and remove corporate data
-Classify data according to sensitivity of data being carried
For contact click here .