Increase mobile IT security – 5 tips for companies
Increase mobile IT security – 5 tips for companies

The digitalization of the world of work is increasing the number of employees who work remotely, i.e. on the move or from home. The IT security of mobile end devices, such as laptops, tablets and smartphones, in everyday working life is therefore becoming increasingly important for companies and their employees.
While traditionally fixed desktop computers are primarily exposed to external threats such as ransomware or phishing, mobile devices that leave the secure company network offer a much larger attack surface – and not just for cyber criminals. When using portable work devices, employers need to be aware of the physical dangers in addition to the virtual dangers. This significantly increases the administrative effort required to ensure consistent corporate security.
Remote working is undoubtedly in line with our digitalization zeitgeist, but poses significant security risks to data integrity that must be avoided. This makes it all the more important to develop an IT strategy for mobile IT security that takes the following factors and preventive IT security measures into account:
#1 – Data loss due to theft
In contrast to immobile desktop computers, mobile devices are carried everywhere. As a general rule, work equipment should never be transported unattended and should always be kept safe. Nevertheless, managing directors are responsible for training their employees on how to behave in the event of theft in order to prevent the loss of sensitive company data. Security measures include regularly backing up data to an encrypted cloud, as well as using strong passwords, PINs and two-factor authentication to prevent access to the device and data. Activating GPS services can also be helpful in locating and recovering the stolen device after it has been stolen.
#2 – Strangers’ glances jeopardize data protection
A mostly invisible threat to data protection is the gaze of strangers on the device screen. The unauthorized viewing of confidential company data poses a major IT security risk, as strangers with supposedly malicious intentions can pass on the information they have seen to third parties unnoticed. A good protection against this is a privacy film that is stuck to the display and only allows a direct frontal view. In crowded places, you and your employees should still leave their mobile devices switched off if possible.
#3 – Threat from public networks
Employees who want to work on the move rely on a network connection to access the internet on portable devices. The use of free public Wi-Fi networks at train stations, cafés or hotels is therefore very tempting. However, as these Wi-Fi networks are usually not adequately secured, they offer an IT security vulnerability, allowing malware to be infiltrated into the devices. Bring-your-own-device (BYOD) devices in particular pose a threat to the internal company network. The risk of man-in-the-middle (MitM) attacks, in which data traffic is intercepted by third parties and confidential information is stolen, also increases when using public networks. It is therefore advisable to set up a virtual private network (VPN) and install anti-malware software. In addition, employees should be made aware of the need to wait until they are connected to a secure Wi-Fi hotspot before transferring confidential data while on the move.
#4 – Outdated operating systems
Manufacturers always endeavor to keep their operating systems and apps up to date with regular system updates and security patches in order to close any IT security gaps that are discovered and prevent future IT security risks. A company should administratively install the latest operating systems on all devices and inform its employees when new system versions are available. It is also advisable to activate “automatic updates” on mobile devices so that vulnerabilities are fixed at an early stage and updates are installed automatically.
#5 – Applications & app permissions
Unlike desktop computers, employers cannot control or block the installation of new programs on mobile and especially BYOD devices. Third-party apps that are downloaded without authorization often pose several threats to the mobile security chain. The most well-known danger is malware. In addition, unrestricted app permissions can lead to sensitive data being passed on to third parties and processed. Excessive app permissions give applications access to functions such as camera, microphone and location data, which can lead to additional information being passed on to untrustworthy third parties. It is advisable for employers to create guidelines that employees must adhere to when using portable devices and apps so that the IT security of the devices is not compromised. These guidelines can include the obligation to install anti-malware software, regular checks and potential deactivation of application permissions, as well as a reminder to only download work-related applications.
Mobile devices have become indispensable today, as they simplify working while traveling or working from home and even make it more convenient. This makes it all the more important to provide employees with sufficient information about the dangers and risks of using such devices in order to ensure mobile IT security and protect company data.
About us
We are a powerhouse of IT specialists and support customers with digitalization. Our experts optimize modern workplace, DevOps, security, big data management and cloud solutions as well as end user support. We focus on long-term collaboration and promote the personal development of our employees. Together, we are building a future-proof powerhouse and supporting customers on their path to successful digitalization.