What steps should the IT department take to prevent spyware on mobile devices?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Corporations need to look at some form of mobile device management product. These deliver over-the-air distribution of applications, data and configuration settings for a wide range of mobile devices. These tools make it a lot easier for administrators to keep devices configured securely and free of spyware. Another approach is to create an enterprise app store. This enables employees to get apps from one location. Administrators can fully risk-assess the apps they make available in the store. That's a great way to prevent spyware from getting on bring-your-own devices.
Also, it's important to look at mobile devices that offer container or workspace technologies that provide a dual persona on the device. Mobile vendors like Apple, BlackBerry and Samsung already offer this type of workspace separation in their products. This reduces the chance of spyware being installed that can actually access enterprise data, because the users can keep their personal apps; they're well separated and sandboxed away from the enterprise apps and the enterprise data.
Cybersecurity is every CIO's problem
The benefits of intelligence-driven security
Make security programs a competitive gain
Webcast: Security controls that prevent modern cyberthreats
Dig Deeper on Security and risk management for Small Business
Michael Cobb, Application Security asks:
What is your top defense against spyware on mobile devices?
2 ResponsesJoin the Discussion
Related Q&A from Michael Cobb
Amazon disabled native encryption capabilities in the latest Fire OS version. Expert Michael Cobb explains what this means for security, and if ...continue reading
A pirated app called Happy Daily English beat Apple's App Store security review. Expert Michael Cobb explains how it works and what security teams ...continue reading
The Lenovo SHAREit file-sharing app has a hardcoded password vulnerability, among other issues. Expert Michael Cobb explains these flaws and how to ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.