The Dataprise Blog

5 Actions to Improve Your Mobile Device and Endpoint Security

Nov 19, 2021 BY DATAPRISE

5 Actions to Improve Your Mobile Device and Endpoint Security

A recent study showed 71% of US CEOs are “extremely concerned” about cyber threats — ahead of pandemics and other health crises.

This concern is well-founded considering:

  • 70% of successful breaches originate at the endpoint
  • 70M smartphones are lost each year, with only 7% recovered
  • $3.86M is the average cost of a data breach

Today, let’s examine five pointers to reinforce your organization's mobile device security and management.


Plan and build a mobile security policy that can be enforced through MDM.

Often Mobile Device Management (MDM) is looked at as just a security tool, when in fact it’s a policy enforcement tool that protects your organization against mistakes your end-users could make with their phone security. Listen to our inside expert, David Schwartz, explain how the policy is meant to help the end-users as well.


Enroll ALL Devices – No Exceptions

This topic goes hand in hand with the statistic that 40% of CEOs view mobile devices as their biggest IT security threat. Let's have Dave explain the best way to mitigate:

Because of the presence of the hybrid workplace, employees' devices are crucial to the success and security of your business. The best practice is that no exceptions in enrollment can be made, even regarding VIP level employees within the organization.


Dos and Don’ts of Mobile Security

With the state of the workplace and employees coming into new jobs and leaving the organization, what you tend to see happen is “Bring your own Device”. When that happens, the users have typically used their personal apple IDs or Gmail accounts to set up their iPhones or Androids.

Don’t use your personal apple IDs and Gmail accounts for corporate devices.

Do use your personal apple IDs and Gmail accounts for personal devices.

Let's break down what happens if there is not a plan in place:


Centrally Manage Applications, Including Email

The best practice for all organizations would be that in order for employees to receive corporate emails onto their personal device or access tools that they need for day to day, the device would be required to be enrolled.

Listen to David break down the two ways that organizations look at app management to secure smartphones:


Encourage Use of Corporate Repositories for Backup

Historically, end users set up devices to back up to various other personal tools that corporate information should never live on. When that information is backed up to those devices, the risks increase significantly, since it’s impossible to manage what steps an end-user has taken from a security standpoint on their personal devices.



Now is the time to take action and enhance your organization's mobile device endpoint security. It’s a fact that mobile devices are becoming more and more integrated as an endpoint, and all endpoints need to be secured. Use our 5 points above to get your organization off to a great start, but also check out our recent MDM Webinar, which highlights 10 tricks for your organization to implement!

Information Security
Want the latest IT insights? SUBSCRIBE