CellTrust Blog

Five Best Practices for Securing Mobile Devices and Everything They Touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s vulnerable.

As a trusted device, that mobile phone has access to corporate networks as well, including the confidential data stored on them – emails, passwords, financial information, etc. In most companies, mobile devices such as smartphones and tablets are now as common as desk phones and desktop computers. In some cases, they have already displaced these common devices. That prevalence is a major reason why hackers are increasingly targeting mobile devices—and why businesses can’t afford not to secure them.

Although security breaches involving mobile devices keep making headlines, many organizations still have yet to develop a plan for minimizing their vulnerabilities. The good news is that there are at least five proven ways to mitigate security risks. Check out my latest article in BetaNews to learn several practices for securing mobile devices: http://bit.ly/1kU0w1N


K Royal is the Vice President, Assistant General Counsel and serves as the Privacy Officer for CellTrust. An attorney and compliance professional with 20 years of experience in the legal and health-related fields, she brings a thorough perspective in global program implementation. Skilled in privacy law, breach management, compliance and program development, Ms. Royal was recently honored as the ACC’s 2015 Robert I. Townsend, Jr. Member of the Year.

  • Follow: