
by Leigh Taylor, Head of Cyber Defence
Most people worldwide have a mobile device (over 90%), and more than half of internet traffic comes from mobile users. This makes smartphones a big market for developers and marketers who want to reach millions quickly. Unfortunately, it also means you're at a higher risk from cyber criminals trying to get to your information.
With the increasing frequency of data breaches, it's crucial for organisations to put in place checks and processes that guarantee the application of security standards throughout the entire company, including all mobile devices and endpoints. Taking a proactive approach not only improves the organisation's overall security stance but, more importantly, acts as a preventive measure against potential data breaches.
Within this blog, we'll explore the impact of data breaches stemming from unsecured endpoints and discuss the precautions you can adopt to steer clear of such breaches.
The hidden risks of unsecured mobile devices When it comes to endpoints, mobiles and indeed many corporate-owned IT assets are some of the least regulated tools employees use. They are often overlooked even though they store just as much sensitive information as laptops and desktops.
Mobile devices typically make up around 60% of an organisation's endpoints, all with the capacity to access millions of confidential and sensitive company files. More than 40% of data breaches trace back to unsecured endpoints. Unsecured endpoints-such as tablets, laptops or smartphones -can become access points for hackers attempting to start an attack within a company's network, such as mobile ransomware and operating system (OS) exploitation. Company-owned mobile devices access valuable corporate data on a daily basis and must be secured to prevent a data breach.
Tracing the wider impact of a mobile attack In 2021, a Swedish company specialising in radiation services and supplying related data equipment faced a data breach impacting nearly 200 patients' health records. The breach occurred when hackers targeted the company using a mobile ransomware attack on one of its devices, exploiting insufficient security measures for almost three weeks.
As a third-party service provider used by various US healthcare providers, the data breach's impact also extended to its partners, demonstrating what wide-ranging effect an attack can have, not only on the intended target but also on their supply chain.
Best practices for endpoint and mobile security Users need to be able to access company data and information remotely, so enabling mobile access is a top priority for most organisations. But it's not just as simple as providing users with a device and letting them log onto their email client of choice or use their own device at work.
Striking a balance is essential ensuring a straightforward onboarding process for end users while guaranteeing they can complete their tasks and access company information securely.
Here are our 6 mobile security best practice tips to help you keep your mobile devices secure:
Enforce security compliance controls on devices
Using Mobile Device Management (MDM) you can make sure that all your devices have security installed. Some of the more common controls might include single sign on, block lists, enforcement of updates, DLP and device wipe capability.
Implement multi-factor authentication (MFA)
Putting in place MFA makes it more difficult for hackers to access your company information and corporate databases. MFA adds an extra layer of protection for endpoints, reducing the chance of unauthorised access.
Encrypt your data
If data is encrypted, you prevent criminals from accessing or viewing sensitive corporate files if the phone is lost or stolen.
Keep software up to date and perform backups
One of the best ways to fight against that is to ensure that all managed devices are fully up to date with the latest malware protection. Performing regular backups on company devices also reduces the possibility of data loss.
Establish a process for handling all corporate-owned IT assets
Recycling or reselling mobiles or other devices without destroying the data can leave you exposed to threats. All data should be wiped following the NIST 800-88 data destruction standard. If the device is lost or stolen the IT team need to be able to destroy data remotely.
Educate your end users
Your employees and end users are your human firewall'. It's important to train them and keep them informed on current threats and vulnerabilities.
Once you've implemented and actioned all the steps above, sitting and waiting for an attack to find out if your strategy is working is high risk. This is where 24 7 Managed Detection and Response (MDR) comes into play. With MDR, security breaches are quickly identified and isolated. This continuous monitoring service, operated by cyber security experts, uses advanced technology and analytics to detect and respond to threats in real-time, round the clock. It's not just about having tools in place; it's about having a dedicated team that's always vigilant, analysing and responding to threats before they can escalate.
In addition to MDR, you should run regular security audits and hire external parties to conduct penetration tests to identify any weaknesses in your defences. Trial smishing and phishing campaigns can be instrumental in assessing if your employees are well-prepared to recognise and respond to these threats. These campaigns also test the effectiveness of your communication and training, confirming if you have the right processes and tools in place for them to report suspicious instances.
By combining proactive measures like MDR with regular testing and employee training, your organisation can establish a robust security posture that not only prev
Most recent headlines
05/01/2027
Worlds first 802.15.4ab-UWB chip verified by Calterah and Rohde & Schwarz to be ...
04/08/2026
Dalet, a leading technology and service provider for media-rich organizations, t...
04/07/2026
April 7 2026, 19:00 (PDT) Detective Conan: Fallen Angel of the Highway Opens in...
01/06/2026
January 6 2026, 05:30 (PST) Dolby Sets the New Standard for Premium Entertainment at CES 2026
Throughout the week, Dolby brings to life the latest innovatio...
04/05/2026
just:play pro 2026 and just:live pro 2026 are available to download!
More Details:At NAB 2026, ToolsOnAir showcased just:play pro 2026 and just:live pro 2026, ...
04/05/2026
just:in mac pro 2026 - The Next Level of Professional Recording on macOS
More Details:The headline innovation in just:in mac pro 2026 is the new Auto format si...
04/05/2026
Hardware is still an emphasis - Supershooter 11 is new, and REMI-based 65 is in ...
04/05/2026
Head of International Business Development Min Joo Kim explores the league's...
04/05/2026
Audio-Technica has announced that its ATND1061 ceiling array microphone and ATUC...
04/05/2026
Triple B Media has launched Bowling TV, a free ad-supported television (FAST) channel dedicated to bowling. The channel is available on Prime Video, LG Channels...
04/05/2026
PlayMetrics, a provider of operations management software for youth sports organizations, has announced the completion of its acquisition of substantially all t...
04/05/2026
IHSE GmbH has announced that Dr. Thomas Niessen has joined as CEO and Managing Director, effective May 1, 2026. He joins Frank Breitenfelder, who has served as ...
04/05/2026
PMY Group deployed its AI-powered crowd intelligence platform, Optic, at the For...
04/05/2026
Behind The Mic provides a roundup of recent news regarding on-air talent, includ...
04/05/2026
Last week, guests gathered in New York City for On Air, In Style: An Evening with Spotify-a night of conversation, culture, and connection celebrating the inter...
04/05/2026
New music & post-production features added
Avid's latest DAW update delivers an array of helpful features aimed at both music and post-production users,...
04/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
04/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
04/05/2026
Student Spotlight: Joshua Griffin The New Orleans native, who was named the 2026 student commencement speaker for Boston Conservatory at Berklee, talks about ...
04/05/2026
It's Andrew! stomps onto screens this June 4 May 2026
The ABC and Screen Australia are delighted to announce that brand new preschool series, It's Andr...
03/05/2026
Polysynth now features Mutable Instruments' macro oscillators
Melbourne Instruments have just released a free firmware update that brings the engine beh...
03/05/2026
Introducing the new Mistika Workflows Suite: transformative and cost-effective f...
03/05/2026
Introducing the new Mistake Workflows Suite: transformative and cost-effective f...
03/05/2026
Back to All News
Filming begins on the third and final season of Breathless
Entertainment
03 May 2026
GlobalSpain
Link copied to clipboard
Discover the vi...
02/05/2026
(L-R) Dustin Hoffman and Leo Woodall appear in Tuner by Daniel Roher, an official selection of the 2026 Sundance Film Festival. (Photo courtesy of Sundance In...
02/05/2026
Versatile re-amping tool announced
Warm Audio are best known for their recreations of sought-after vintage studio gear, but their latest release brings a ne...
02/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/05/2026
Scripps Research immunologist Dennis Burton elected to American Academy of Arts and Sciences A leader in broadly neutralizing antibodies, Burton has helped driv...
02/05/2026
Dalet, a leading technology and service provider for media-rich organizations, t...
01/05/2026
Ratings Roundup is a rundown of recent rating news and is derived from press rel...
01/05/2026
BKB Bare Knuckle Boxing ( BKB ), today announced the appointment of Will Wright ...
01/05/2026
Lawo has been at the center of the industry's transition to IP and other next-generation technologies. At NAB 2026, its story was the Edge One AV stagebox, ...
01/05/2026
HBA Media, acting on behalf of NBC Sports and Churchill Downs Incorporated, has announced broadcast and streaming distribution for Kentucky Derby 152, taking pl...
01/05/2026
By Bailey Pennick
One of the most exciting things about the Sundance Film Festi...
01/05/2026
Florals for spring? Groundbreaking. But a playlist that tells you which The Devi...
01/05/2026
One of the world's biggest popstars is headed to El Cl sico. Later this mont...
01/05/2026
Limited-edition model celebrates 15th anniversary
Heritage Audio's range of monitor controllers has just gained a new member, the Baby RAM Black Edition...
01/05/2026
Dumble recreation now available as UAD plug-in
Along with their renowned processing plug-ins, Universal Audio have been steadily introducing emulations of c...
01/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
01/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
01/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
01/05/2026
To celebrate the opening of its new showroom and office, Lightware UK hosted a dedicated launch event at the new London location. The event welcomed partners, c...
01/05/2026
Choice without compromise
The broadcast industrys transformation is accelerating, and traditional broadcasters are having to fundamentally reinvent how they o...
01/05/2026
Beam Dynamics will return to MPTS 2026 with its asset intelligence platform, helping systems integrators, live production teams, media facilities and profession...
01/05/2026
Best-in-class UX design and rapid, scalable delivery for next-generation viewing experiences
Leading video software provider, Synamedia, today announced a coll...
01/05/2026
Compact new cforce MAX lens motor brings unrivaled speed and responsiveness to t...
01/05/2026
Panavision welcomes Fritz Heinzle as Vice President of Sales
Brie Clayton May 1, 2026
0 Comments
Heinzle will support Panavision's global growth s...