To begin, Covington, Scotts and Sakarya discuss rising cybersecurity trends in the current market. These trends hinge on the prioritization of mobile work where IT and Security teams are being forced to provide user-centered access to company resources without the protections of a company network perimeter. This has led to:
- A blurring of business and personal boundaries on mobile devices
- A change in focus toward mobile security
- A shift in the allocation of mobile devices to a different set of workers
- An increase in access of confidential data leading to innovation in mobile technology
While many of the same strategies for computer security apply to mobile security, mobile device security incites more considerations:
- Threat actors have more success on mobile devices because of the size and “on-the-go” usage of these devices
- Traditional malware is a different experience on mobile devices, but users remain a significant vulnerability for all devices
- Mobile devices are sometimes perceived as more secure, but still need to be patched and updated to ensure security
Hence, mobile device security requires multiple layers of protection, from user awareness to update policies and beyond.
The group proceeds to talk about how organizations can approach mobile security. When using managed mobile devices, organizations should consider partitioning the devices into “work” and “personal” partitions to separate company and personal data. This ensures that corporate information is kept secured and that personal data is kept private. Additional approaches are discussed, including:
- Achieving transparency into your devices
- Keeping devices in compliance
- Meeting industry benchmarks
- Consolidating management and security platforms
This episode concludes with discussions about how the Jamf platform can provide mobile device management and security for iOS, iPadOS and Android devices.
Visit the Jamf After Dark website to find a complete list of past episodes and subscribe to our RSS feed.
Subscribe to the Jamf Blog
Have market trends, Apple updates and Jamf news delivered directly to your inbox.
To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.