• Latest
  • All
  • How To
LG Optimus 3D

How secure is your data on Mobile devices?

January 10, 2012
KEMIS

KEMIS: Kenya’s New Education Data System Set to Replace NEMIS in 2025

May 16, 2025
White Genocide

Who Tweaked Grok? Inside the AI’s Wild White Genocide Rant

May 16, 2025
Google One

Google One Surges to 150 Million Subscribers Thanks to AI Premium Plan

May 16, 2025
twitter x

X Enhances Video Capabilities with 4K Upload Option

May 16, 2025
DHgate Tablet Cases deals
openai-chatgpt

ChatGPT May Soon Be Able To Record, Transcribe & Summarise Meetings

May 16, 2025
Telegram

Telegram Shuts Down $35 Billion Crypto Black Markets in Major Crackdown

May 16, 2025
Peak Points

YouTube to Drop Ads When You’re Most Glued to the Screen

May 15, 2025
Safaricom-IXAfrica-Centres-1

Safaricom Partners with iXAfrica to Build Region’s First AI-Ready Data Centre

May 15, 2025
samsung one ui 8

One UI 8 Update: Is Your Samsung Device on the List?

May 15, 2025
Apple Music

Apple Music Now Lets Spotify Users Seamlessly Transfer Playlists

May 15, 2025
Kennedy Kachwanya, Chairperson BAKE

High Court Issues Ban on Internet Shutdowns by Government and Mobile Operators

May 14, 2025
Advanced Protection feature

Google Expands Advanced Protection in Android 16 to Tackle Spyware Threats

May 14, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

How secure is your data on Mobile devices?

Samuel K Itotia by Samuel K Itotia
January 10, 2012
in News
Reading Time: 3 mins read
264
0
LG Optimus 3D

If an unsecure enterprise mobile device is lost or stolen, its owner can do nothing to ensure the safety of the data stored on the device. That’s why it’s so important for IT to work with users and take precautionary mobile devicesecurity measures now — before a device gets lost and valuable data falls into the wrong hands.
optimus
The latest versions of Apple’s iOS and the Android operating system offer similar options for protecting data on enterprise mobile devices that are lost or stolen. These four mobile device security best practices are general, but applicable to most devices and OSes.

Step 1 to mobile device security: Screen protection

Mobile device security starts by configuring appropriate screen protection. There are different options available, such as PINs, patterns and passwords. It doesn’t matter which protection method the user chooses, as long as one is in place. There is no way to protect data on a missing device if screen protection isn’t enabled in advance. IT can require the use of screen protection through Exchange ActiveSync or most enterprise mobile devicemanagement software.

After configuring screen protection, set a policy to protect against unauthorized access. The most common type of policy wipes a device’s contents after a specified number of failed password entries. This action prevents against some of the weaker screen-protection methods; for example, a thief will eventually guess a four-digit PIN after 10,000 attempts.

Encrypting enterprise mobile devices

To take data protection to the next level, it’s important to encrypt enterprise mobile devices. Encryption is vital, because a mobile device is a kind of computer that stores data in a file system on a disk. As such there are several ways to access that data. For example, anyone can connect a mobile device to a Linux computer that offers support for all file systems ever created. When connected, the device acts as an external hard disk, and everything stored on the device becomes readable on the computer.

For some devices, it doesn’t even take a Linux computer to access data. Most smartphones automatically open when connected to a Windows 7 computer, so users can conveniently copy files to and from their devices. But it’s also convenient for the person that found or stole the device.

 

Encryption provides protection against these mobile device security threats. Only after entering the right PIN, pattern or password will the person connecting the device be able to access its data.

Improving mobile device security with remote wipe

Remote-wipe capabilities, which let users or IT delete data from lost or stolen devices, can add an extra layer of protection. Remote wipe is available on devices with SIM cards for 3G and 4G data networks, as long as the device is connected to the network.

For remote wipe to work, however, a device must be registered before it gets lost. Users can register their devices through the manufacturer’s website and sometimes through third-party security apps as well. Once the device is lost or stolen, it’s too late to register the device — and it could be too late to save the data.

In case of honesty…

Not all missing enterprise mobile devices end up in the hands of an evil-doer. An honest person could find the device, in which case it should be easy for that person to find the device owner (or the owner’s employer). Configure mobile devices to display these contact details before log in. This information can help someone return devices to their rightful owners, while also preventing unnecessary remote wipes.

 

 

Tags: AndroidCloud ComputingData SecurityGadgetsTechweez
SendShare146Tweet92
Samuel K Itotia

Samuel K Itotia

IT Project Consultant, Bachelor of Computer Science holder, Microsoft Certified IT Professional. Certified Google Apps Cloud Deployment specialist and Trainer. Passionate on the new trends of Technology. He will always share it with the world.

Related Posts

Apple Music

Apple Music Now Lets Spotify Users Seamlessly Transfer Playlists

May 15, 2025
Advanced Protection feature

Google Expands Advanced Protection in Android 16 to Tackle Spyware Threats

May 14, 2025
Google keep

You Can Now Bold and Format Text in Google Keep on the Web

May 13, 2025
Google messages

Google Messages Rolls Out New Features Including Delete for Everyone

May 12, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
Intrusion Detection System

Android 16 Will Let You Track Suspicious Activity on Your Phone

May 6, 2025

Latest

KEMIS

KEMIS: Kenya’s New Education Data System Set to Replace NEMIS in 2025

May 16, 2025
White Genocide

Who Tweaked Grok? Inside the AI’s Wild White Genocide Rant

May 16, 2025
Google One

Google One Surges to 150 Million Subscribers Thanks to AI Premium Plan

May 16, 2025
twitter x

X Enhances Video Capabilities with 4K Upload Option

May 16, 2025
openai-chatgpt

ChatGPT May Soon Be Able To Record, Transcribe & Summarise Meetings

May 16, 2025
Telegram

Telegram Shuts Down $35 Billion Crypto Black Markets in Major Crackdown

May 16, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

KEMIS: Kenya’s New Education Data System Set to Replace NEMIS in 2025

May 16, 2025

Who Tweaked Grok? Inside the AI’s Wild White Genocide Rant

May 16, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

YouTube to Drop Ads When You’re Most Glued to the Screen

Safaricom Partners with iXAfrica to Build Region’s First AI-Ready Data Centre

One UI 8 Update: Is Your Samsung Device on the List?

Apple Music Now Lets Spotify Users Seamlessly Transfer Playlists

High Court Issues Ban on Internet Shutdowns by Government and Mobile Operators

Google Expands Advanced Protection in Android 16 to Tackle Spyware Threats

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.