Be the first to hear the mobile news. Enter your email to join.

33 Cyber Security Tips from the Experts

  • Chelsea Curtis By

Cyber Security Awareness Month is drawing to a close, and as we’ve covered recently on the Blog, the stats surrounding mobile security are dizzying. To better help end users and enterprises prepare a sound security strategy to defend against such mobile cyberattacks, we’ve hosted some insightful webinars, scoured the web for the best advice and reached out to top influencers and experts on Twitter to get their best tips.

Check out the insights below, and tell us your best piece of cyber security advice in the comment section or tweet us @AirWatch.

Use Two-Factor Authentication

Create Strong Passwords

Educate and Empower Your Users

“For the enterprise you should always think segregation, when it comes to mobile security and employee BYOD policy in particular. For example, employee’s personal devices should not connect to the same VLAN as enterprise-owned devices. All BYOD throughput should be throttled so that it doesn’t affect the organization. If an organization mitigates BYOD risk to the employee, it is in good faith to also provide employees with adequate information about necessary virus protection for their devices, safe data practices, and identity theft risks, protection, and restoration steps when needed.” – @ElizabethT_A

Use Common Sense

“Don’t jail break your device – you’re only asking for trouble.” – @RayVazquez1

Do Your Research

“Acquire mobile security software; simple passwords and encryption are not enough to truly protect yourself or the enterprise.” – @RayVazquez1

Be Aware

“My best advice for people and companies is to always assume someone is trying to misuse your data and identity. It’s very important to be careful where your data resides and how you access it. We all have so many devices and methods that we use to access sensitive data, we have to realize that each device we use can be like a set of keys. We have to make sure we’re protecting those keys at all times.” – @RichWaidmann

“If you don’t need it, get rid of it. Each piece of software or data is an opportunity for a vulnerability or a breach. While apps are useful, and data is necessary, limit your exposure to the data and software that is genuinely useful. Why take on added risk with no expected benefit?” – @dnlongen

“If you don’t pay for it, ask who does. An app with a million users is a valuable advertising platform; a social network with a billion followers has vast amounts of information about its users. The developers are making a profit somehow. That’s not necessarily a bad thing – as long as you recognize that fact and make a conscious decision to trade (or not trade) a modicum of privacy or the intrusion of seemingly-sentient advertising for that app or service.” – @dnlongen

Protect Your Apps

“Pay attention to the permissions an app requests – both when installing a new app and when installing an update. If an app requests privacy-invading permissions that are not necessary for the function of that app, think about whether the benefit justifies what you are giving up.” – @dnlongen

“Never ever, download mobile applications outside of the Google Play or iTunes stores.” – @RayVazquez1

Mind Your Updates

“If you do need it, keep it up to date (if possible). Apple regularly provides updates for multiple generations of iOS devices. The Android ecosystem means updates for Android devices themselves are dependent on device manufacturers and cellular carriers, but update if you can. Regardless, you can still keep your apps current.” – @dlongen

Tell us your best piece of cyber security advice in the comment section or tweet us @AirWatch.

Chelsea Curtis

Chelsea Curtis

Chelsea manages social media for AirWatch and shares updates about events, trending topics and news on the AirWatch Blog. She most enjoys meeting the customers, partners and prospects that she interacts with each day during AirWatch Connect events.

Leave a Reply

Your email address will not be published. Required fields are marked *


Blog By Region

Blog By Category: