What is Mobile Device Management?

It’s amazing what small companies can accomplish today using mobile devices. But the more we connect to our business IT networks via smartphones, tablets, and laptops, the more cybercriminals will target us. You need to protect your firm with a solid mobile device management program.

Gaze back through ancient history – which for computer equipment is about five years – and ask yourself how much of your work involved mobile devices and apps compared with today. Did you even really know what an “app” was five years ago?

If your work has been shifting significantly toward mobile, there’s a good business reason for it. In Verizon’s 2020 Mobile Index Survey, 80% of SMBs said using mobile devices to access business systems is key to their profitability and productivity.

Using mobile devices to access business systems is key to their profitability and productivity.

Unfortunately, the additional risk created by mobile devices is also well-documented, as we’ll explain below. But first, some background about how companies can manage this risk through a tool called mobile device management.

What is Mobile Device Management?

In IT industry terminology, mobile device management (MDM) is a category of third-party tools that help organizations configure, track, and protect smartphones, tablets, and laptops that have access to its IT network.  

This allows IT staff (or an outsourced managed IT service provider) to monitor each connected device for cyber attacks, and remotely adjust settings, apps, encryption, etc., to some or all your devices. It’s connected via apps installed on your employees’ devices, so you have control that allows you to, for example:

  • Install security patches
  • Enforce strong passwords
  • Prevent download of potentially dangerous apps
  • Block the use of unsecure Wi-Fi networks
  • Encrypt all data sent over unsecured networks
  • Scan devices for vulnerabilities
  • Lock down a lost or stolen device and wipe company data if necessary  

We’ll get into more detail about the capabilities of these tools in the section about what to look for in a mobile device manager provider.

What Mobile Device Management is NOT: Big Brother

Employees may be wary about mobile device management tools. Understandably, they don’t want their employer to have access or control over their private use of their mobile devices.

Mobile device management systems don’t allow the employer or third parties to see personal images or texts.

Your team should know that mobile device management systems don’t allow the employer or third parties to see personal images or texts, or to eavesdrop on phone conversations. Tracking features are designed to help locate lost devices, not track employees’ whereabouts 24/7.

If you implement mobile device management on personal devices, explain to employees that it is used to protect the company data accessed via those devices by enforcing minimum security requirements.

And if you issue company-owned devices, explain that mobile device management allows the company to control what employees can and can’t do with those devices, but it doesn’t allow the company to do surveillance on the users.

Small Businesses Take a Big Cybercrime Hit Aimed at Mobile Devices

Another result of the Verizon 2020 survey that caught our eye, as small business owners:

“More than one in four (28%) SMBs suffered a mobile device related compromise, and 43% of those SMBs said mitigating the damage was "difficult and expensive."

Too many SMBs lack the in-house expertise to detect a mobile security incident quickly, and to react properly to remediate the damage. Additionally, they were less able to afford the aftermath if their current customers leave – due to the reputational damage security incidents cause. 

How big a hit? 

According to a 2019 National Cyber Security Alliance survey, 28% of SMBs had suffered a data breach within the previous year, and of those:

  • 1 in 4 declared bankruptcy
  • 1 in 10 went out of business

We’ve established that the threat is real and the consequences flat-out stink, so let’s move on to how mobile device management can help your organization avoid becoming a cybersecurity statistic.

Five Things to Look for in a Mobile Device Management System

If you outsource your IT to a managed IT services provider, that firm should be able to help with due diligence in choosing a mobile device management provider best suited to your operations.

A popular choice among Teal’s clients is Cisco Meraki Systems Manager. Another common choice is Microsoft Intune which some of our clients have included in higher-tier Windows 365 subscriptions.

Watch this video for a basic overview of how mobile device management works:

Here are the general capabilities a mobile device management solution should give your company.

1. Device Inventory and Tracking

Inventory Your Mobile Devices and Track How They’re Being Used

BASICS

It gives you the ability to find and identify all mobile devices attached to your network, including their location.

It’s important because you should be able to account for all of the devices that can connect with your network. Quickly spotting unauthorized devices, or authorized devices that aren’t properly protecting your data, can help you close security gaps before you get stung.

KEY TACTICS

Block Rogue Devices: Look for a solution that can not only spot unauthorized devices on your network, but also identify whether it’s a smartphone, tablet, PC, etc., and its manufacturer/operating system, so you can lock out repeat offenders.

Get Snapshots of Mobile Activity: The tracking feature can produce regular reports on useful metrics, such as employees’ bandwidth and app usage rates (more about app usage in #3).

2. Remote Configuration of Device Settings

Configure All of Your Devices Consistently – Without Making Employees Bring Them In

BASICS

It gives you control over the settings each connected device needs to securely connect with your network.

It’s important because you can use this access to each device’s settings to configure them remotely without asking your employees to bring the devices in, or worse, do it themselves.

KEY TACTICS

Apply Uniform Security Settings: Generally, the goal is to be consistent with all the settings that affect cybersecurity — such as the device’s ability to connect with unsecured Wi-Fi networks — while minimizing disruptions to your employees’ work.

3. Distributing and Controlling Apps

Remotely Install Apps, and Keep Risky Apps From Infecting Your Network

BASICS

It gives you authority over which types of apps the managed devices can and can’t use, and the ability to remotely install specific apps your employees need for your business.

It’s important because some apps pose a serious security risk, either because they’re designed to get malware into your IT network, or they have a vulnerability that cyber thieves have learned to exploit.

KEY TACTICS 

“Whitelist” Approved Apps: You can use your mobile device management tool to create a list of apps that are allowed to be downloaded by each type of device. 

No Free Passes for Apple App Store and Google Play Store: A report about the state of mobile security in 2020 by the cloud security company, Wandera, shows that it’s not safe for companies to simply allow only apps from the two major app outlets. The sheer quantity and complexity of apps has overwhelmed the ability of these stores to test apps for security vulnerabilities or even malicious code.

Beware the Jail Breakers: Wandera research also shows that one in five Android users have “jailbroken” their devices to allow them to install sketchy “third-party” apps from outside of the Play Store. Wandera’s recommendation: Use a mobile security solution that includes an app vetting component and the ability to automatically detect and shut down suspect apps.

Teal Blog Feature Images 21

4. Password Enforcement

Ensure That Passwords Won’t Be Easily Hacked

BASICS 

It gives you the power to require your mobile device users to use proper password hygiene. The mobile device management system can require strong passwords and/or two-factor authentication (2FA).

It’s important because many people still recycle one password for multiple personal and business accounts and/or they use easily hacked passwords. Cyber thieves exploit these habits with hacking techniques such as credential stuffing, which can easily lead hackers from personal mobile accounts into your business IT network.

KEY TACTICS 

Set Login Requirements to Stop “Recycling”: A mobile device management tool can not only require strong password standards, but it can also prevent people from using the same password for multiple accounts.

In a survey by Security.org, 72% of respondents said they recycle passwords (an average of four times). Even worse, 63% of these recyclers said they use the same passwords for non-important accounts like social media and for important accounts such as business.

63% of these recyclers said they use the same passwords for non-important accounts.

Require 2FA for Business Accounts Accessed via Mobile Devices: This means that, in addition to a password, users must enter a code that’s sent via email or text, or that’s generated by a separate device such as a key fob.

The 2020 State of Password and Authentication Security Behaviors Report by the Ponemon Institute touts the value of 2FA but says only 35% of the users surveyed use 2FA for work.

5. Data encryption and data wiping:

Encrypt Sensitive Data or Wipe It From At-Risk Devices

BASICS

It gives you an extra layer of security on data that is stored and exchanged on mobile devices.

It’s important because it makes your data useless – or at least less attractive – to cybercriminals, and because it protects your company’s data when an employee’s device is lost or stolen.

KEY TACTICS 

Encrypt Sensitive Data That is Sent Over Public Networks: Only 51% of the companies surveyed for the Verizon report I mentioned earlier said they do this. People send data from mobile devices too often via unsecure public networks not to encrypt that data.

Make a Would-be Hacker’s Job on a Lost/Stolen Device Much More Difficult: If you’ve configured all of your managed mobile devices for whole-disk encryption and PIN security codes, a lost or stolen device will be very difficult to crack. As soon as you know the device is missing, you can wipe your company data from it if necessary.

Wipe Data from the Devices of People Leaving the Company: As soon as you’re aware that an employee or contractor should no longer have access to your company data, you can wipe that data whether the device is on site or not. 

Balancing Convenience With Security is Key to Mobile Device Management

In a 2019 survey by NetMotion of workers who rely on mobile devices, 20% of the respondents listed restrictive IT security policies as their most frustrating issue.

We cybersecurity geeks want to protect your mobile device data in every way possible; however, we know it’s just as important for your employees to be able to do their jobs effectively.

Mobile device management tools allow you to adjust authentication requirements, depending on what’s working well for your company. These solutions can also help you protect business data on mobile devices without encroaching on your employees’ personal usage and data.

Your goal should be to find a balance between the convenience and privacy of your mobile device users and your company’s need for reasonable data security.

Latest Teal News

Subscribe to Our Newsletter

Join Teal Exclusive now to be notified of the latest news, tech tips, and more.

Recent Articles
Categories
Don’t Stop Here

More To Explore

Remote Work

Solving Common Remote Work Security Challenges

Organizations face increasing threats from phishing scams, the use of insecure passwords, and the complexity of managing personal devices. Tackling these issues head-on is essential