New Training: Plan for Device and Apps
In this 7-video skill, CBT Nuggets trainer John Munjoma covers the factors of planning and managing devices and apps with Microsoft. Watch this new Microsoft 365 training.
Learn Microsoft 365 with one of these courses:
This training includes:
45 minutes of training
You’ll learn these topics in this skill:
Configuring Microsoft Store for Business
Assigning Applications to Users and Groups
Planning App Deployment
Device Co-Management and Monitoring
Plan for Device Profiles
Planning For Mobile Application Management
Mobile Device Security
Unique Considerations in Mobile Device Security
All IT assets must be secured, but the first level of good cybersecurity with traditional IT components is physical security. Mobile devices throw a wrench into this from the very beginning, and securing devices that can go virtually anywhere requires a different mindset and approach.
Another complicating factor is monitoring and governing employee use. While some of this concern revolves around ensuring that assets are used appropriately (smartphones weren't issued to help employees earn top scores in Candy Crush), the ability to modify a phone's system by installing new apps is something that must be carefully considered. Unauthorized apps, even when installed for appropriate business use, could introduce security breaches and compromise proprietary or restricted information.
Unsecure Wi-Fi is an additional concern. Mobile devices often encounter networks that aren't secured, many of which could be easily compromised. Giving employees the flexibility to access Wi-Fi when needed is critical, but ensuring that this doesn't compromise the data on the mobile device is just as crucial.
These and other unique considerations require that mobile device security be characterized by an intentional, systematic approach that incorporates established best practices.