SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Mobile Malware:
10 Tips for Prevention
Don’t let their size and convenience fool you—
smartphones and tablets are very much a target
of today’s cybercriminals. Our experts offered these
10 tips to help protect your employees and your
business from mobile malware.
Enforce bring your own device
(BYOD) policies
Keep your mobile devices close, and your enemies
closer. Bringing personal devices to work can be
a win-win for the company and employees, as long
as your policies are clear and enforced.

Download a sample BYOD policy
Educate employees on
mobile malware
Do your employees know that smartphones
and tablets are subject to the same risks as a
personal computer? Educate them on the risks
associated with mobile malware, from malicious
apps to SMS fraud.

Download our free malware detection tool
for Android
Keep operating systems
up to date
It sounds simple, but manufacturers and mobile
subscription providers sometimes block operating
system updates to support their own best interests.
Stick with providers that are applying updates.

Download our Malware Goes Mobile whitepaper
Provide secure wireless access
at all times
Free Wi-Fi networks are like an all-you-can-eat
buffet of unsuspecting victims for cybercriminals.
Provide employees with secure VPN connections
and a strict policy for acceptable use.

Download our Wi-Fi Hot Tips paper
Install apps from
trusted sources
Don’t be afraid to limit the places where
employees can shop for mobile apps.
Larger organizations may want to consider
building an enterprise application store they
can control.

Download our Malware Goes Mobile whitepaper
Encourage the use of
anti-malware software
Android devices are the most popular, which
means they are the biggest target for malware.
Require employees to protect these devices
with the latest security software.

Download our free malware detection tool for Android
Prevent jailbreaks
No, we don’t mean employees playing hooky.
Jailbreaking is the process of removing security
limitations on a mobile device in order to access
features. It also provides malware with access to
your data.

Read about our mobile control solutions
Encrypt your devices
Restaurants, airports, taxicabs—the places where
employees can lose their devices are limitless.
Protect your data by requiring full encryption
and strong passwords to access devices and
SIM cards.

Download our free encryption tool
Offer cloud-sharing alternatives
Bad things can happen in an unsecured
cloud. Provide employees with a secure,
authorized cloud-based storage service and
discourage them from using easily compromised
consumer-based clouds.

Read about our mobile encryption solution
Manage mobile security
within your existing framework
Never compromise the security of your network in
favor of end-user freedom. If a mobile device does
not comply with your IT environment or security
framework, it doesn’t get in.

Read about Sophos Mobile Control
We don’t take mobile security
lightly. Neither should you.
Employees are bringing mobile devices to work.
It’s your job to prevent them from becoming
a threat to the business. Sophos Mobile Control
provides the tools you need to manage devices and
applications efficiently within your IT environment.
Contact us today to learn more.

Explore our mobile security solutions at Sophos.com.

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (8)

Your Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and RansomwareYour Money or Your File! Highway Robbery with Blackhole and Ransomware
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Instagram Marketing und Anzeigen crashkurs
Instagram Marketing und Anzeigen crashkurs Instagram Marketing und Anzeigen crashkurs
Instagram Marketing und Anzeigen crashkurs
 
Mobiles Internet - Trends und Herausforderungen
Mobiles Internet - Trends und HerausforderungenMobiles Internet - Trends und Herausforderungen
Mobiles Internet - Trends und Herausforderungen
 
Die Herausforderungen für Retail Banken durch das Phänomen Mobile
Die Herausforderungen für Retail Banken durch das Phänomen MobileDie Herausforderungen für Retail Banken durch das Phänomen Mobile
Die Herausforderungen für Retail Banken durch das Phänomen Mobile
 
Mobile Untersuchung der TOP 20 eCommerce Shops GER
Mobile Untersuchung der TOP 20 eCommerce Shops GERMobile Untersuchung der TOP 20 eCommerce Shops GER
Mobile Untersuchung der TOP 20 eCommerce Shops GER
 
Apple TV UX: 8 Guidelines for greater Apps
Apple TV UX: 8 Guidelines for greater Apps Apple TV UX: 8 Guidelines for greater Apps
Apple TV UX: 8 Guidelines for greater Apps
 

Mehr von Sophos

When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
Sophos
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 

Mehr von Sophos (16)

Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
2013 Security Threat Report
2013 Security Threat Report2013 Security Threat Report
2013 Security Threat Report
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
When Malware Goes Mobile
When Malware Goes MobileWhen Malware Goes Mobile
When Malware Goes Mobile
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)IT Security DOs und DON’Ts (Italian)
IT Security DOs und DON’Ts (Italian)
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Mobile Malware: 10 Tips for Prevention

  • 1. Mobile Malware: 10 Tips for Prevention Don’t let their size and convenience fool you— smartphones and tablets are very much a target of today’s cybercriminals. Our experts offered these 10 tips to help protect your employees and your business from mobile malware.
  • 2. Enforce bring your own device (BYOD) policies Keep your mobile devices close, and your enemies closer. Bringing personal devices to work can be a win-win for the company and employees, as long as your policies are clear and enforced. Download a sample BYOD policy
  • 3. Educate employees on mobile malware Do your employees know that smartphones and tablets are subject to the same risks as a personal computer? Educate them on the risks associated with mobile malware, from malicious apps to SMS fraud. Download our free malware detection tool for Android
  • 4. Keep operating systems up to date It sounds simple, but manufacturers and mobile subscription providers sometimes block operating system updates to support their own best interests. Stick with providers that are applying updates. Download our Malware Goes Mobile whitepaper
  • 5. Provide secure wireless access at all times Free Wi-Fi networks are like an all-you-can-eat buffet of unsuspecting victims for cybercriminals. Provide employees with secure VPN connections and a strict policy for acceptable use. Download our Wi-Fi Hot Tips paper
  • 6. Install apps from trusted sources Don’t be afraid to limit the places where employees can shop for mobile apps. Larger organizations may want to consider building an enterprise application store they can control. Download our Malware Goes Mobile whitepaper
  • 7. Encourage the use of anti-malware software Android devices are the most popular, which means they are the biggest target for malware. Require employees to protect these devices with the latest security software. Download our free malware detection tool for Android
  • 8. Prevent jailbreaks No, we don’t mean employees playing hooky. Jailbreaking is the process of removing security limitations on a mobile device in order to access features. It also provides malware with access to your data. Read about our mobile control solutions
  • 9. Encrypt your devices Restaurants, airports, taxicabs—the places where employees can lose their devices are limitless. Protect your data by requiring full encryption and strong passwords to access devices and SIM cards. Download our free encryption tool
  • 10. Offer cloud-sharing alternatives Bad things can happen in an unsecured cloud. Provide employees with a secure, authorized cloud-based storage service and discourage them from using easily compromised consumer-based clouds. Read about our mobile encryption solution
  • 11. Manage mobile security within your existing framework Never compromise the security of your network in favor of end-user freedom. If a mobile device does not comply with your IT environment or security framework, it doesn’t get in. Read about Sophos Mobile Control
  • 12. We don’t take mobile security lightly. Neither should you. Employees are bringing mobile devices to work. It’s your job to prevent them from becoming a threat to the business. Sophos Mobile Control provides the tools you need to manage devices and applications efficiently within your IT environment. Contact us today to learn more. Explore our mobile security solutions at Sophos.com.