{"id":3757,"date":"2015-03-30T18:53:39","date_gmt":"2015-03-30T18:53:39","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3757"},"modified":"2020-02-26T11:00:58","modified_gmt":"2020-02-26T16:00:58","slug":"a-few-words-on-ensuring-mobile-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/a-few-words-on-ensuring-mobile-security\/3757\/","title":{"rendered":"Attack or steal: two equal mobile device threats"},"content":{"rendered":"<p>Losing a phone is always a bit of a nuisance, especially if it\u2019s an expensive piece of hardware. With smartphones conquering the world with authority, losing a phone means also losing at least some personal data, such as recently taken pictures, music purchases, etc. It gets even worse if the device has work documents not meant to be seen by anyone outside of the company \u2013 then it becomes more than a personal problem.<\/p>\n<p>Losing a smartphone is so common that it is a long-standing risk factor with the BYOD concept for IT workers and is seen as a\u00a0<a href=\"https:\/\/business.kaspersky.com\/losability-of-mobile-devices-as-a-risk-factor\/1077\" target=\"_blank\" rel=\"noopener nofollow\">\u201ctypical nightmare\u201d<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Your phone, attacked by cybercrime, or simply lost. Either way, your data is stolen\u00a0#mobilesecurity<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FbA3R&amp;text=Your+phone%2C+attacked+by+cybercrime%2C+or+simply+lost.+Either+way%2C+your+data+is+stolen%C2%A0%23mobilesecurity\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Any mobile device (a laptop, a tablet or a smartphone) can be lost easily. Laptops are left on public transportation and in airports; tablets can be easily concealed under a menu in a restaurant or left in the chair next to you, never to be seen again; and smartphones are picked from pockets.<\/p>\n<p>According to a recent <a href=\"https:\/\/www.kaspersky.com\/about\/news\/product\/2015\/Kaspersky-Phound-Can-Be-Found-on-Google-Play\" target=\"_blank\" rel=\"noopener nofollow\">survey<\/a>, over a one-year period one respondent in twenty, on average \u2013 and as many as one in six for some countries! \u2013 lost their smartphone or tablet as a result of carelessness or theft. At the same time, 38% of users admitted that their devices contained confidential data that they would definitely not want to fall into the wrong hands.<\/p>\n<p>And that doesn\u2019t only apply to documents, but also passwords and PIN-codes, as well as any other \u201chackers\u2019 fodder\u201d.<\/p>\n<p>This all makes it necessary to have the ability to find a lost gadget remotely, or, in the worst case, brick it, so that data cannot be milked from it.<\/p>\n Click on the image to take a check\u00a0our Webinar recording dedicated to ensuring the mobile security.\n<p>Kaspersky Lab has a number of solutions intended to protect data on mobile devices \u2013 using any means necessary.<\/p>\n<p>We have\u00a0just released a new free mobile app called Phound! for Android users, that allows you to block devices or even wipe data by restoring factory defaults.<\/p>\n<p>There is also a mobile app for business-grade users \u2013 <a href=\"https:\/\/www.kaspersky.com\/products\/business\/security-applications\/mobile-device-management\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mobile<\/a> with all functions necessary to mitigate the enterprise IT worker\u2019s \u201ctypical nightmare\u201d. It provides centralized visibility and control \u2013 so you can see, secure, and manage every mobile device that accesses your network and your corporate data. And in a case of emergency (theft or loss), protect the information \u2013 lock the missing device, selectively wipe apps and data from the device, and display the device\u2019s location on a map.<\/p>\n<p>You can also sound an alarm on the device and capture photographs of unauthorized users \u2013 these portraits may not be a piece of art, but will do well in\u00a0a police database.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Find and retrieve \u2013 or brick and wipe: the ABC of #mobilesecurity.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FbA3R&amp;text=Find+and+retrieve+%26%238211%3B+or+brick+and+wipe%3A+the+ABC+of+%23mobilesecurity.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Support for Google Cloud Messaging (GCM) helps to ensure Android phones can receive all anti-theft commands rapidly.<\/p>\n<p>Even if an unauthorized user changes the SIM card in the device, Kaspersky Lab\u2019s SIM Watch technology will send you the device\u2019s new number \u2013 so you can continue to have remote access to all anti-theft features.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> also offers specific Mobile Device Security functions, which include anti-malware and anti-theft technologies to protect Android devices.<\/p>\n<p>All of these products share certain features allowing users to rediscover or lock down a lost\/stolen device remotely.<\/p>\n<p>Which is a necessity when it is all about safeguarding the sensitive data stored in a mobile.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Losing a phone is always a bit of a nuisance, especially if it\u2019s an expensive piece of hardware. With smartphones conquering the world with authority, losing a phone means also<\/p>\n","protected":false},"author":209,"featured_media":15721,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[218],"class_list":{"0":"post-3757","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-mobile-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-few-words-on-ensuring-mobile-security\/3757\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-few-words-on-ensuring-mobile-security\/3757\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-few-words-on-ensuring-mobile-security\/3757\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/mobile-security\/","name":"Mobile Security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3757"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3757\/revisions"}],"predecessor-version":[{"id":33491,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3757\/revisions\/33491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15721"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}