Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Smartphones Gain Ground, Mobile Cybersecurity Gains Importance

By Josh Sookman
December 9, 2014

Last month, I wrote an article on the Emergence of Smartphones as a Key Platform for Security Industry that discussed the growing ubiquity of smartphones within the workplace and the increasing number of mobile apps that have the ability to collect information from its environment such as video streams, audio streams, indoor location and information from other sensors.

In stark contrast to the focus on the information that mobile devices may capture, store and provide intelligence back to an organization, this article focuses on what intelligence others might be able to capture about your organization by accessing an employee’s mobile device in an unauthorized manner.

Sensitive information may exist on mobile devices in many places including email, SMS and instant messaging archives, contacts and phone records, as well as a growing number of enterprise mobile apps that extend major enterprise CRM, ERP, HR and other systems as well as document repositories and other databases setup for off-network, mobile access.

The cybersecurity threat to unauthorized data access is essentially the same for smartphones as it is for tablets, laptops or any other mobile device operating outside of an organization’s physical offices. However, smartphones are more commonly lost, stolen and vulnerable to attack; they are also (generally) more locked-down – think “Apple” – in terms of what sorts of functions and low-level controls that device manufacturers and operating system providers allow companies and mobile application developers to install and execute on smartphones and tablets versus laptop computers.

The emergence of Mobile Device Management (MDM) providers are helping to address some of these mobile security concerns through the use of secure containers for company information and apps, improved encryption and the ability to remotely wipe sensitive and other information off devices that are lost or stolen, or when an incorrect device password has been entered a certain number of times.

MDM isn’t for everyone, and there is no clear winner yet in the space; MDM vendors are still putting together pieces to the puzzle in their unique ways. Similarly, each organization will ultimately set up their own IT policies and procedures, and aim to manage risk in accordance within their own unique risk exposure limits.

For organizations not yet sold on MDM, there are several proactive measures that can still be undertaken to better understand your risk and batten down the hatches.

Vulnerability Assessment

If you choose to get a vulnerability assessment, ensure that the firm reviews your organization’s policies surrounding mobile device access and the use of passwords, accessing corporate information using VPNs, email access and email archive history available to users on mobile devices. The assessment should also cover third-party enterprise mobile apps that connect to major enterprise systems and additional security layers required to login, access and alter information within those systems. Third-party mobile apps serve a variety of function within large organizations, from sales to business intelligence to security, and not every mobile application may require a full audit or assessment. Assessment priority should be dictated and aligned with the level and depth of sensitive information that may be accessed, abused or misused by cybercriminal or cyberterrorist activities.

Strong Passwords

Though it seems simple, the vast majority of attacks still stem from weak passwords, and a set of passwords that are all identical. By employing a simple mandate to use strong passwords on mobile devices for access, and a different set of strong passwords for email access, network login and for access to other enterprise systems, you can drastically reduce overall organizational risk to intellectual property and other information breaches. By having a unique password for each system, a criminal's ability to breach each successive system will be thwarted – or at a minimum delayed further – providing IT groups with greater amounts of time to deny system access or remotely wipe device data.

Device Tracking and Cyberthreat Prevention

Third party mobile apps may be installed to track the location of employee’s mobile devices – both outdoors (using GPS) and indoors within corporate offices. By developing policies that limit data access (i.e. specific data and documents) to mobile devices in certain locations, an organization may prevent access to sensitive information outside the US, for example if a traveler’s phone is stolen overseas. These location-based policies may be as broad as “country-level”, more moderate such as “within 1 mile of a particular office”, or as granular as “only on floor 7” of a particular building.

KEYWORDS: Bring Your Own Device (BYOD) mobile cybersecurity mobile device management smartphone security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Josh Sookman is the Founder and VP of Business Development for Guardly, the leading provider of indoor positioning and mobile app-based crisis communications solutions to large enterprises. Josh is an active member of ASIS and SIA, and a contributing writer to several security industry publications. His volunteer work in youth entrepreneurship has included initiatives with Stanford, MIT, Intel, Verizon and several local technology incubators in Toronto, Canada, where he resides. Contact Josh and learn more at: https://www.guardly.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Emergence of Smartphones as a Key Platform for Security Industry

    See More
  • Whitepaper: Assessing Emergency Response Times on Campus

    See More
  • Vendor System Integrations Accelerate in the Security Industry

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing