{"id":5641,"date":"2021-09-07T20:26:09","date_gmt":"2021-09-07T20:26:09","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5641"},"modified":"2021-09-07T20:29:31","modified_gmt":"2021-09-07T20:29:31","slug":"mobile-security","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5641","title":{"rendered":"Mobile Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5641\" class=\"elementor elementor-5641\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7c6e7036 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c6e7036\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c2a8b82 ot-flex-column-vertical\" data-id=\"6c2a8b82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cec0d66 elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"cec0d66\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-649d9fb1 ot-column-items-top ot-flex-column-vertical\" data-id=\"649d9fb1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-771adc00 elementor-widget elementor-widget-iheading\" data-id=\"771adc00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ mobile security<\/span>\r\n\t        <h2 class=\"main-heading\">Gain Full Visibility And Control Over Mobile User Activity<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5cb902d ot-flex-column-vertical\" data-id=\"5cb902d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdf2ae8 elementor-widget elementor-widget-image\" data-id=\"bdf2ae8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"376\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/sophos-sms-microsoft-intune-diagram-768x376-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-2447\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/sophos-sms-microsoft-intune-diagram-768x376-1.jpg 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/sophos-sms-microsoft-intune-diagram-768x376-1-300x147.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/sophos-sms-microsoft-intune-diagram-768x376-1-720x353.jpg 720w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3cefda3e elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"3cefda3e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-577dc1c8 ot-flex-column-vertical\" data-id=\"577dc1c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ed6d350 elementor-widget elementor-widget-text-editor\" data-id=\"6ed6d350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Improved capabilities of current mobile devices are converting them from portable email clients to viable desktop replacements and now viewed as the centerpiece of modern information knowledge work. In some cases, such as Windows 10 devices, there is virtually no difference between a tablet and a desktop, except the form factor.<\/strong><\/p><p>Unfortunately, hackers don\u2019t care about the form factor: From their point of view, mobile devices are just an organization\u2019s desktop, but one that doesn\u2019t have the extensive protection of a corporate perimeter. This makes them easy pickings to be hacked. With increasing numbers of people accessing and creating documents on the go through Office 365 and Google Apps, these devices now have an equal level of access to sensitive corporate information, and thus require equivalent protection.<\/p><p>This includes:<br \/>\u2022 Anti-malware and\/or application whitelisting:\u00a0Not only are app stores not as safe as they purport, applications can be side-loaded, and vulnerabilities such as Blue-Borne have demonstrated that arbitrary code can be introduced through remote code execution vulnerabilities.<br \/>\u2022 Encryption of sensitive files:\u00a0Even when users don\u2019t use tablets and phones to store files, sensitive information can be insecurely cached from email, web and chat programs. Also, users will often download a file for a review and forget that it is in their downloaded files folder. These can easily be used by criminals that either have remote or physical access to the mobile device.<br \/>\u2022 Remote management capability:\u00a0Originally known as mobile device management, the ability to push down software and enforce security policy (such as pin\/password complexity) remains as relevant today.<br \/>Mobile security management needs to treat all of your mobile devices in the same manner as non-mobile devices because they expose the same security risks \u2013 if not higher.<\/p><p>If you\u2019re not sure whether your mobile strategy is having a negative impact on your security posture, contact DataSecure Security for an obligation free chat, and review some of our strategies to help you go mobile more safely.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2386af8d ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2386af8d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36cc6528 ot-flex-column-vertical\" data-id=\"36cc6528\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55a1168a elementor-widget elementor-widget-heading\" data-id=\"55a1168a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Drop us a line! We are here to answer your questions 24\/7<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f18d3e6 elementor-widget elementor-widget-heading\" data-id=\"f18d3e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEED CONSULTATION?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f6e7247 elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"5f6e7247\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/datasecc.com\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contact Us<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ mobile security Gain Full Visibility And Control Over Mobile User Activity Improved capabilities of current mobile devices are converting them from portable email clients to viable desktop replacements and now viewed as the centerpiece of modern information knowledge work. In some cases, such as Windows 10 devices, there is virtually no difference between a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5641","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5641"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5641\/revisions"}],"predecessor-version":[{"id":5646,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5641\/revisions\/5646"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}