Skip to main content
App management icon

This post is from the Apperian blog and has not been updated since the original publish date.

Last Updated Apr 03, 2013 — App Management expert

Top 5 Mobile Security Risks in the BYOD Age

App Management
As a growing number of employees participate in the bring your own device (BYOD) movement, serious mobile security considerations are raised for IT and business leaders who are concerned about the protection of corporate data. In this article, we examine the top 5 mobile security risks in the enterprise and steps that can be taken to help mitigate these risks using a mobile application management (MAM) solution. 
  1. Third-party apps. Whenever employees download and install mobile applications onto their personal devices, they often unknowingly install apps infected with malware that can steal information from a user’s device without their knowledge, as noted in a recent ZDNet article. Effective mobile app management solutions can help protect the enterprise and prevent proprietary information from falling into the wrong hands by regularly inspecting devices for security compromises and then proceed accordingly (e.g. app deletion or device wipe).
  2. Stolen or lost devices. One of the greatest concerns that many enterprise IT and business leaders share regarding the BYOD movement is the threat of an employee or an executive having their mobile device lost or stolen, especially those devices that may contain highly sensitive company or customer information. A cloud-based mobile application management program can help allay those concerns by wiping a device clean regardless of who may have obtained the device or where it is physically located.
  3. Disgruntled employees. Unhappy workers who are poised to leave a company also pose a high security risk if they intend to transfer sensitive corporate information to rival organizations. Providing employees with clear guidance on a company’s security policies, including rules against sharing corporate information after termination, is important for liability protection while acting as an effective deterrent in many cases. Cloud-based MAM solutions can remotely wipe or lock personal devices and protect sensitive information from being dispersed.
  4. Public Wi-Fi. Airports, restaurants, hotel lobbies, and other public venues are popular spots for people to access Wi-Fi. But when employees surf unsecured hot spots, they inadvertently expose sensitive corporate data to cyber thieves. MAM programs provide enterprise IT with visibility into the usage of enterprise apps in these settings.
  5. Cyber attacks. Cyber attacks are on the rise this year, leading government and corporate IT teams to keep a close eye out for potential intrusions. IT professionals can use MAM solutions to identify enterprise apps that may be in use by employees on their mobile devices if and when an intrusion should occur and then take appropriate steps to secure those apps and the data that’s contained.

More from the Blog

View more
Apr 30, 2020

Mobile Application Management: A Forward View

App Management
  IT Is Adapting in the Midst of the COVID-19 Pandemic The Coron ...
Read More
Nov 19, 2018

Breaking Down the New California IoT Law

Application Security
Recently California passed legislation regarding the security of all I ...
Read More
Nov 14, 2018

Securing mobile apps against reverse engineering and hacking [Podcast]

Application Security
Listen to Alissa Knight interview Ken Jochims about Arxan Technologies ...
Read More
Oct 25, 2018

Securing Connected Medical Device Apps [Infographic]

Application Security
Contact Us