Mobile Endpoint Security is a big Challenge for Enterprises.

Mobile endpoint security, by Alessandro Civati
  • Endpoint protection
  • Application security solutions
  • The use of VPNs
  • Avoiding public Wi-Fi hotspots
  • Ensure that device OS and apps are updated: Ensure that all devices connected to a corporate network have up-to-date operating systems. Many updates will include vulnerability patches to help keep hackers seeking to exploit mobile devices at bay. Ensure that the auto-update settings for applications or OS are turned on so that your device receives patches whenever they are available.
  • Use verified apps: Ensure that all devices connect to an enterprise’s network download apps from official app stores such as Apple App Store and Google Play. Attackers duplicate some popular apps and lace them with malware before making them available on third party sites.
  • Invest in security awareness training for all employees: Humans are the weakest link in any security system or enterprise environment. Security awareness training will equip employees with the necessary knowledge and skills to identify and stay away from malicious links and other social engineering attempts. Employees will be better equipped to avoid taking the bait and ushering in attackers on the network. All security measures taken will be rendered useless once malware has already infiltrated a device.
  • Ensure that data is encrypted: All sensitive data, documents, and communications for a corporate entity must be encrypted — Amy corporate organization must-have policy with regard to data encryption and the requirements involved. The level of encryption must be consistent with the sensitivity of the data handled by the organization. A good example is that of a financial services company that should be very strict with the data encryption policies. It should also ensure that employees are using verified communication platforms that have end-to-end encryption and fall within the compliance regulations put in place.
  • Use strong passwords and password management: The organization should put in place a stringent password policy. Every password should incorporate random characters and should not be shorter than 15 characters in length. Employees should be discouraged from using the same password across both personal and enterprise accounts. Finally, the principle of least privileged access should be used across the organization.

LutinX digitally protect your idea, skills and values. We are an Hybrid Blockchain Platform KYC & AML Compliance with multiple Blockchain APPs in a single SUITE

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How To Choose Trustworthy Plugins For Your WordPress Site

OFF-US vs. ON-US trans

Side Channel Attack (SCA)

Bug hunting for fun and profit (2020 edition)

Take a look at Past, Present and Future of the web

How Instagram Helped Me To Exploit XSS 🔥

Why I Use the Brave Browser

TryHackMe | Dunkle Materie Walkthrough

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
LutinX Inc.

LutinX Inc.

LutinX digitally protect your idea, skills and values. We are an Hybrid Blockchain Platform KYC & AML Compliance with multiple Blockchain APPs in a single SUITE

More from Medium

My First Time at ShmooCon

What Are The Different Types Of Security Penetration Testing?

A Guide to the OSWE Certification — Feraverse Security

Hack-A-Sat 3 Qualification Round​ 2022