
by Leigh Taylor, Head of Cyber Defence
Most people worldwide have a mobile device (over 90%), and more than half of internet traffic comes from mobile users. This makes smartphones a big market for developers and marketers who want to reach millions quickly. Unfortunately, it also means you're at a higher risk from cyber criminals trying to get to your information.
With the increasing frequency of data breaches, it's crucial for organisations to put in place checks and processes that guarantee the application of security standards throughout the entire company, including all mobile devices and endpoints. Taking a proactive approach not only improves the organisation's overall security stance but, more importantly, acts as a preventive measure against potential data breaches.
Within this blog, we'll explore the impact of data breaches stemming from unsecured endpoints and discuss the precautions you can adopt to steer clear of such breaches.
The hidden risks of unsecured mobile devices When it comes to endpoints, mobiles and indeed many corporate-owned IT assets are some of the least regulated tools employees use. They are often overlooked even though they store just as much sensitive information as laptops and desktops.
Mobile devices typically make up around 60% of an organisation's endpoints, all with the capacity to access millions of confidential and sensitive company files. More than 40% of data breaches trace back to unsecured endpoints. Unsecured endpoints-such as tablets, laptops or smartphones -can become access points for hackers attempting to start an attack within a company's network, such as mobile ransomware and operating system (OS) exploitation. Company-owned mobile devices access valuable corporate data on a daily basis and must be secured to prevent a data breach.
Tracing the wider impact of a mobile attack In 2021, a Swedish company specialising in radiation services and supplying related data equipment faced a data breach impacting nearly 200 patients' health records. The breach occurred when hackers targeted the company using a mobile ransomware attack on one of its devices, exploiting insufficient security measures for almost three weeks.
As a third-party service provider used by various US healthcare providers, the data breach's impact also extended to its partners, demonstrating what wide-ranging effect an attack can have, not only on the intended target but also on their supply chain.
Best practices for endpoint and mobile security Users need to be able to access company data and information remotely, so enabling mobile access is a top priority for most organisations. But it's not just as simple as providing users with a device and letting them log onto their email client of choice or use their own device at work.
Striking a balance is essential ensuring a straightforward onboarding process for end users while guaranteeing they can complete their tasks and access company information securely.
Here are our 6 mobile security best practice tips to help you keep your mobile devices secure:
Enforce security compliance controls on devices
Using Mobile Device Management (MDM) you can make sure that all your devices have security installed. Some of the more common controls might include single sign on, block lists, enforcement of updates, DLP and device wipe capability.
Implement multi-factor authentication (MFA)
Putting in place MFA makes it more difficult for hackers to access your company information and corporate databases. MFA adds an extra layer of protection for endpoints, reducing the chance of unauthorised access.
Encrypt your data
If data is encrypted, you prevent criminals from accessing or viewing sensitive corporate files if the phone is lost or stolen.
Keep software up to date and perform backups
One of the best ways to fight against that is to ensure that all managed devices are fully up to date with the latest malware protection. Performing regular backups on company devices also reduces the possibility of data loss.
Establish a process for handling all corporate-owned IT assets
Recycling or reselling mobiles or other devices without destroying the data can leave you exposed to threats. All data should be wiped following the NIST 800-88 data destruction standard. If the device is lost or stolen the IT team need to be able to destroy data remotely.
Educate your end users
Your employees and end users are your human firewall'. It's important to train them and keep them informed on current threats and vulnerabilities.
Once you've implemented and actioned all the steps above, sitting and waiting for an attack to find out if your strategy is working is high risk. This is where 24 7 Managed Detection and Response (MDR) comes into play. With MDR, security breaches are quickly identified and isolated. This continuous monitoring service, operated by cyber security experts, uses advanced technology and analytics to detect and respond to threats in real-time, round the clock. It's not just about having tools in place; it's about having a dedicated team that's always vigilant, analysing and responding to threats before they can escalate.
In addition to MDR, you should run regular security audits and hire external parties to conduct penetration tests to identify any weaknesses in your defences. Trial smishing and phishing campaigns can be instrumental in assessing if your employees are well-prepared to recognise and respond to these threats. These campaigns also test the effectiveness of your communication and training, confirming if you have the right processes and tools in place for them to report suspicious instances.
By combining proactive measures like MDR with regular testing and employee training, your organisation can establish a robust security posture that not only prev
Most recent headlines
05/01/2027
Worlds first 802.15.4ab-UWB chip verified by Calterah and Rohde & Schwarz to be ...
01/06/2026
January 6 2026, 05:30 (PST) Dolby Sets the New Standard for Premium Entertainment at CES 2026
Throughout the week, Dolby brings to life the latest innovatio...
01/05/2026
January 5 2026, 18:30 (PST) NBCUniversal's Peacock to Be First Streamer to ...
01/04/2026
January 4 2026, 18:00 (PST) DOLBY AND DOUYIN EMPOWER THE NEXT GENERATON OF CREATORS WITH DOLBY VISION
Douyin Users Can Now Create And Share Videos With Stun...
03/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
03/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
03/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
03/02/2026
Berklee Alumni Recognized at the 2026 Grammy Awards Winners took home trophies in nine categories, including Best Traditional Pop Vocal Album and Songwriter o...
02/02/2026
SBS's High-Flying Drama The Airport Chaplain casts Hugo Weaving alongside Th...
02/02/2026
The National Film and Video Foundation (NFVF), in partnership with the French Institute of South Africa (IFAS), is calling for applications from experienced Sou...
02/02/2026
Photo Credit: NASA. Space Launch System (SLS) rocket and Orion Spacecraft rollou...
02/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/02/2026
Hewshott, an industry leading global AV, IT, Theatre, and Acoustics consultancy firm has completed a global transition with current UK Managing Director, Daniel...
02/02/2026
Public Media Management (PMM) today announced LTN as the technology partner for PMM Cloud, its new managed, cloud-based master control solution purpose-built fo...
02/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/02/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
02/02/2026
XR, the leading platform powering advertising operations, today announced the acquisition of Telly Traffic, a UK-based business affairs specialist with nearly t...
02/02/2026
Big Blue Marble, a provider of broadcast-grade, cloud-native video solutions for broadcasters, service providers, and content owners, has become a launch partne...
02/02/2026
February 2 2026, 20:30 (PST) Mahindra launches XUV 7XO as Indias first vehicle ...
02/02/2026
Teaser available to view HERE
Damien Molony as Jim Bergerac
Ahead of the hotly anticipated return of Bergerac to U and U&DRAMA in the Spring, a teaser has bee...
02/02/2026
Rohde & Schwarz reshapes mid-range market with new 44 GHz FPL spectrum analyzer ...
02/02/2026
Back to All News
Cesc Gays New Film Premieres March 27 on Netflix
Entertainment
02 February 2026
GlobalSpain
Link copied to clipboard
Download the first i...
02/02/2026
In addition to DPA Microphones, the company will also be acquiring Wisycom and Austrian Audio. The acquisition is now being filed for regulatory approval and sh...
02/02/2026
Arvato Systems launches a flexible and standardized billing solution
New SAP S/4HANA Utilities master system combines standardization, economies of scale, and...
31/01/2026
Spotify's annual Best New Artist celebration returned to Los Angeles last ni...
31/01/2026
The Navy's Air Test and Evaluation Squadron (HX) 21 launch a Long Range Attack Missile from an AH-1Z off coast of Virginia in late 2025. This demonstration ...
31/01/2026
DigitalGlue, creator of the award-winning creative.space Platform, has announced the release of creative.space OS 3.0.5, the latest software update within the ...
31/01/2026
ES Broadcast Hire, the long-established hire arm of ES Media Group, has spent the last few months busily preparing and sending out high-quality equipment for a ...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Top L-R: The Friend's House is Here, Josephine, The Lake, Bedford Park, Who Killed Alex Odeh?
Second Row L-R: Take Me Home, American Pachuco: The Legend of...
30/01/2026
Spotify, Haziran ay sonunda kadar stanbul'da yeni bir ofis a aca n ve T rkiye pazar n y netmek zere yeni bir atama ger ekle tirdi ini duyurdu. Bu kaps...
30/01/2026
The Artemis II wet dress rehearsal will simulate the launch countdown, fully loading fuel and verifying systems ahead of the first SLS and Orion crewed flight....
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Grass Valley , the leading technology provider for live production solutions, and NETGEAR Inc. (NASDAQ: NTGR), a global leader in network solutions, today anno...
30/01/2026
tvONE, a leading video processor, signal distribution technology and media server developer, announces the expansion of Amit Singh's role to Regional Sales ...
30/01/2026
With a career that spans four decades across television, film and post-production, Freelance Sound Designer and Post-production Sound Mixer Mike Aiton has built...
30/01/2026
DPA Microphones will feature its new, fully integrated wireless microphone ecosystem, designed to let audio professionals work faster, cleaner and with total co...
30/01/2026
As the Middle East continues to accelerate investment in next-generation media, broadcast, and immersive content technologies, Ventum Tech today announced a str...
30/01/2026
Mark Roberts Motion Control (MRMC), a Nikon company and global leader in robotic camera systems, today announced its participation at Integrated Systems Europe ...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Boston Conservatory at Berklee Hosts the National Opera Association's 2026 C...
30/01/2026
Student Spotlight: Sriram Narayanan The classical pianist shares his experience growing up with a language disability and finding his voice through music.
Ja...