Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Are Tablet Devices Secure for Businesses?

By Joe Oleksak
Exclusives Feature Image
August 23, 2011

The number of tablet owners continues to soar, making it difficult for manufacturers to keep up with demand. New tablet owners are increasingly business users, particularly within industries such as retail, banking, and healthcare. Estimates indicate that 25 percent of tablet sales in 2011 will be made by enterprises, leading some to call 2011 the year of the enterprise tablet. All estimations aside, a tablet’s ability to provide mobility and flexibility is irrefutable, and businesses are noticing. But can tablets be deployed in an enterprise without sacrificing security?

With newer technologies, there’s always risk; however, the natural progression from laptops to tablets (compared to the leap from workstations to laptops in the ’90s) provides risk maturity that can make the move relatively seamless for an enterprise.  Still, there are considerations that should be made prior to migrating.

The use of tablets within a business poses several risks specific to the device (largely due to its mobility) that should be communicated to employees to ensure that the appropriate precautions are taken to secure company information. Mobile device security training should be administered to all employees that require the use of mobile devices before they’re allowed to connect these devices to the organization’s internal network.  Training should include but not be limited to:

  • Physical device security and best practices
  • Use of WiFi and other untrusted “public” networks
  • Use of virtual private networks (VPNs)
  • Use of Bluetooth
  • Jailbreaking and untrusted apps

Similar to inactivity timeouts and “ctl+alt+del” in a typical workstation or laptop environment, passcodes and autolock settings should be implemented to protect the tablet from unauthorized access. Inactivity settings, passcode strength, and the required frequency for passcode changes should all be adjusted to meet business or regulatory requirements.  This can be done per device or centrally with the use of third-party mobile device management (MDM) software. The latter is recommended, as it provides for greater corporate control.

Using MDM, a configuration profile is installed on each device that manages security settings. This configuration profile should be protected from alteration by the end user by restricting access to the profile with the use of an administrator password. In this manner, only authorized individuals can make changes to the settings. Configuration profiles used in conjunction with MDM allow an administrator to make configuration changes centrally and push the updates out to users without the need of any interaction from the end user.

Tablets do not have built-in logging capabilities; however, applications are available that allow an enterprise to centrally log and monitor the following types of activities:

  • Unauthorized attempts to access secure networks
  • Types of devices accessing the network
  • Users authenticating to the network
  • Applications installed on devices
  • GPS location
  • Device information
  • Compliance and security information

Logging and monitoring activity is always good security practice; however, depending upon the industry, logging and monitoring may be a requirement!

Many companies currently protect laptops with full disk encryption.  The need for encryption on tablets is no different.  Tablets should support strong encryption to secure all data on the device. For further protection, tablets should be configured to accept remote and local wipes. The remote wipe feature allows an administrator to remove all data and deactivate devices remotely in the event that they’re lost or stolen. The local wipe function automatically erases all user data on the device after 10 failed passcode attempts.

While encryption and remote wipe features clearly enhance the security of data, they also reinforce the need for regular data backups. Without an enforceable way to require tablet backups, policies and procedures are integral to data availability and protection. Enterprises should communicate to tablet end users the importance of frequent, periodic backups and discourage the creation and/or storage of confidential or critical information on tablets whenever possible.

General guidance for securing mobile devices is available and in most cases can be applied directly to a tablet regardless of platform; however, no federal regulatory or standards agencies have released guidance specifically for the use of tablets. MDM software allows IT administrators to employ many of the same security mechanisms that are recommended or required by federal regulation and guidance for traditional IT systems, but it’s important to note that the risks posed by mobile devices are not one in the same with standard equipment typically deployed by IT departments.

There are many things that need to be taken into consideration when looking at “incorporating” tablets, but remember that the majority of these security implications are going to be addressed for any new technology. The main security risk that tablets pose is mobility and the decentralization of information, but there are ways to implement security. With businesses going mobile, tablets can be powerful tools.

KEYWORDS: mobile device security mobile devices tablet

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Oleksak joe headshot

Joe Oleksak, CISSP, CRISP is a partner in Plante Moran’s cybersecurity practice. Image courtesy of Olesak

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • devices_enews

    7 Ways to Secure Data on Employee Devices

    See More
  • Doorway to Cybersecurity

    Unknown in Users, Data, Devices, and Apps are Major Concerns for CISOs

    See More
  • Techno lights

    New report shows mobile devices are the top endpoint choice for SLED

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • December 12, 2011

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we'll update you on what is out there for camera viewing software along with our reviews. We'll also look at the Axis Product Selector tool and several other applications that are available today.
  • February 3, 2012

    Mobile Surveillance Applications

    Do you know what apps are available to you for your mobile devices to increase you Axis effectiveness? Here's a chance to find out. In this webinar session we’ll update you on what is out there for camera viewing software along with our reviews. We’ll also look at the Axis Product Selector tool and several other applications that are available today.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing