#peterhewer
peterhewer.biz
Although Wi-Fi itself is fine, especially if
it a secure private network. Users will
mistakenly connect to public Wi-Fi
without considering the risk.
Sometimes, a public Wi-Fi network might
seem reputable, but really it was set up
for the intent of luring users into the
network
App leaks on a mobile device expose
sensitive information when an app
developer or web programmer fails to
use HTTPS to securely communicate over
the network. This can happen with a man-
in-the-middle attack.
A robust mobile policy must restrict employees
from accessing enterprise data through public
Wi-Fi. 
Use solutions that enable you to stop the processing
of data in apps that lead to data leakage. Restrict
permission for apps or certain files in order to limit
data leakage.
FRAUDULENT WI-FI HOTSPOTS
MOBILE & PERSONAL APPS
A data leak involves the unauthorised or unintentional
transfer of sensitive information from an enterprise mobile
device to an internet service. If an app or web developer fails
to properly protect data, they are essentially making data –
including sensitive company data - available to anyone who
utilises the same network as the device.
MOBILE DATA LEAKS -
IS THE BIGGEST THREAT
TO MOBILE SECURITY
IN 2019
Employee negligence such as accidental
loss is the main cause of data breaches.
Another top reason is when employees
email sensitive data to a recipient
outside of the organization, or
transferring enterprise data to a public
cloud instead of a private cloud.
When we think about enterprise mobility security, we tend to think of
the worst that can happen and what we need to protect ourselves. The
truth of the matter is that direct malware and hacking attacks on
mobile devices rarely occur. Mobile operating systems are more
secure, and after each upgrade, security is enhanced to prevent these
unsolicited attacks compared to attacks directly on your company
network.
Sources:
https://peterhewer.biz/enterprise-mobility-simple-security-threats/
https://peterhewer.biz/enterprise-mobility-book/
EMPLOYEE NEGLIGENCE
3 COMMON AREAS FOR DATA LEAKS
It’s critical to formalise security rules and
regulations in a mobile policy. Use MDM to allow
and restict access.

3 data leak possibilities that are easy to overlook

  • 1.
    #peterhewer peterhewer.biz Although Wi-Fi itselfis fine, especially if it a secure private network. Users will mistakenly connect to public Wi-Fi without considering the risk. Sometimes, a public Wi-Fi network might seem reputable, but really it was set up for the intent of luring users into the network App leaks on a mobile device expose sensitive information when an app developer or web programmer fails to use HTTPS to securely communicate over the network. This can happen with a man- in-the-middle attack. A robust mobile policy must restrict employees from accessing enterprise data through public Wi-Fi.  Use solutions that enable you to stop the processing of data in apps that lead to data leakage. Restrict permission for apps or certain files in order to limit data leakage. FRAUDULENT WI-FI HOTSPOTS MOBILE & PERSONAL APPS A data leak involves the unauthorised or unintentional transfer of sensitive information from an enterprise mobile device to an internet service. If an app or web developer fails to properly protect data, they are essentially making data – including sensitive company data - available to anyone who utilises the same network as the device. MOBILE DATA LEAKS - IS THE BIGGEST THREAT TO MOBILE SECURITY IN 2019 Employee negligence such as accidental loss is the main cause of data breaches. Another top reason is when employees email sensitive data to a recipient outside of the organization, or transferring enterprise data to a public cloud instead of a private cloud. When we think about enterprise mobility security, we tend to think of the worst that can happen and what we need to protect ourselves. The truth of the matter is that direct malware and hacking attacks on mobile devices rarely occur. Mobile operating systems are more secure, and after each upgrade, security is enhanced to prevent these unsolicited attacks compared to attacks directly on your company network. Sources: https://peterhewer.biz/enterprise-mobility-simple-security-threats/ https://peterhewer.biz/enterprise-mobility-book/ EMPLOYEE NEGLIGENCE 3 COMMON AREAS FOR DATA LEAKS It’s critical to formalise security rules and regulations in a mobile policy. Use MDM to allow and restict access.