URL Source: http://soti.net/resources/blog/2018/3-steps-on-the-path-to-mobile-security

Last Updated At: 2025-09-06 06:24:24 UTC

Description: Enterprise Mobility Management | Mobile Security | Device, App, &amp; Content Management - SOTI

Author: Chris Prendergast

Keywords: Security/Cybersecurity, Enterprise Mobility Management

---

# 3 Steps on the Path to Mobile Security

##### by Chris Prendergast Apr 21, 2018

It really is the Wild West out there — as more device manufacturers pop off new smartphones and tablets, and as everyone and their brother creates new mobile apps, the number of mobile devices and apps are skyrocketing. There are around [2.5 billion smartphones users](https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/) globally and almost [200 billion mobile app downloads](https://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-app-store-downloads/) per year. Smart cyber criminals are increasingly targeting enterprise mobile devices and apps to make money and cause trouble. Mobile devices are soft targets — they operate outside of the walls of the office and use public communications networks to conduct their business. Amazingly, [20% of companies believe that their company](https://blog.checkpoint.com/wp-content/uploads/2017/04/Dimensional_Enterprise-Mobile-Security-Survey.pdf) has already experienced a mobile security breach, while 24% don’t know if they have or haven’t been breached.

How bad is it? Pretty bad and getting worse. Total mobile malware grew 46% over the last four quarters driving [global mobile infection rates over 10%](https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2018.pdf). Think about that — one out of every ten mobile users were impacted by malware in 2017. If that isn’t scary enough, some [Android devices even come with a virus pre-installed,](https://www.independent.co.uk/life-style/gadgets-and-tech/news/android-malware-phones-infected-samsung-galalaxy-s7-nexus-5x-models-before-sale-a7626726.html) how convenient.

[Mobile ransomware is one of the fastest growing categories of malware](https://securelist.com/it-threat-evolution-q1-2017-statistics/78475/), increasing by a factor of 3.5 between late 2016 and early 2017. When you factor in the scale and vulnerability of the Internet of Things, you get a grim picture of the future. Tens of billions of devices and endpoints with little or no security. There are no “silver bullets” in regards to mobile security, but there are some straightforward steps you can take to make things better.

## Create a Corporate Mobility Policy

A [corporate mobility policy](http://hosteddocs.ittoolbox.com/corporate-mobility-policy-template.pdf) will establish guidelines around the assignment and use of mobile devices and apps within your company. It will answer important questions such as, who within the company should get what type of mobile device (Laptop, Tablet or Smartphone)? What apps do workers need or are allowed to install on their own? Who gets access to what documents and files and from where can they access them? Does your company allow or promote bring-your-own-devices (BYOD) and apps? If so, how are they secured to prevent data leakage?

The best corporate mobility policy is simply to have one. Once something is in place, it is easy to grow it and change it as your company evolves and mobile workers figure out new ways to mess things up.

## Use EMM to Enforce Full Lifecycle Mobile Security

Once you have created a corporate mobility policy and educated your workers, it is a good idea to deploy an enterprise mobility management (EMM) solution to enforce it. An EMM solution such as [SOTI MobiControl](http://soti.net/# "Enterprise Mobility Management") brings your corporate mobility policy to life. It controls device security, manages who gets what apps and content, and fixes device problems remotely. However, you need full lifecycle effort; from initial device onboarding and protection, through monitoring and controlling the device during every day use, to its eventual retirement. Your enterprise mobile security is only as strong as its weakest link.

## Follow EMM Best Practices to Prevent / Mitigate Security Threats

For each phase of the mobility lifecycle, SOTI recommends a set of best practices that will prevent and/or mitigate most mobile security threats. It is important to keep abreast of current mobile security trends and threats, but that is not hard as it is one of the most covered topics on the interwebz. Some powerful tips and tricks include:

- Enforce multi-factor authentication for device enrollment, certificate-based authentication for access to corporate WiFi and mandate VPNs to prevent hackers from gaining access corporate resources.
- Use real-time location services (RTLS), such as geofences and location tracking, to minimize the impact, and improve the chances of recovery, of lost or stolen devices.
- Deploy a secure EMM browser to block untrusted sites and minimize man-in-the-middle (MitM) and phishing/social engineering attacks.
- Use an antivirus solution built into, or integrated with, an EMM solution to prevent malware in files and apps from being downloaded/installed on the device.
- Deploy a secure EMM document manager, and enforce complex passwords, encryption, and separation of personal and work data, to prevent data leakage of sensitive/confidential content within corporate apps.

It is time to take mobile security seriously, and these three simple steps are a great place to start. For more information about mobile security, common threats and how to mitigate / prevent them, please download SOTI’s Ebook – Do You Know What's in Your Pocket?

##### About Author

Chris Prendergast

Mobility Researcher

##### Share on social media

[LinkedIn](http://soti.net/#linkedin "Share on LinkedIn")

 [Twitter](http://soti.net/#twitter "Share on Twitter")
 
 [Email](http://soti.net/#email "Share via Email")

##### Featured Posts

- [Discover Ready-to-Use SOTI Snap Apps on the SOTI Pulse Marketplace
Sep 4, 2025 | Shash Anand](http://soti.net/resources/blog/2025/discover-ready-to-use-soti-snap-apps-on-the-soti-pulse-marketplace/)
- [From Booth to CRM: How SOTI Snap Streamlines Lead Capture
Aug 28, 2025 | Shash Anand](http://soti.net/resources/blog/2025/from-booth-to-crm-how-soti-snap-streamlines-lead-capture/)
- [Unlocking SOTI MobiControl XS: Stop Replacing Batteries That Still Work
Aug 26, 2025 | Shash Anand](http://soti.net/resources/blog/2025/unlocking-soti-mobicontrol-xs-stop-replacing-batteries-that-still-work/)
- [SOTI Snap vs Microsoft PowerApps: Why SOTI Comes Out on Top
Aug 21, 2025 | Shash Anand](http://soti.net/resources/blog/2025/soti-snap-vs-microsoft-powerapps-why-soti-comes-out-on-top/)
- [Label Printer Management: A Must-Have for First Responders
Aug 21, 2025 | SOTI](http://soti.net/resources/blog/2025/label-printer-management-a-must-have-for-first-responders/)

##### Request a Demo of 
The SOTI ONE Platform
