SECURITY RECOMMENDATIONS FOR MOBILE DEVICES. ENDPOINT PROTECTION (EPP)

This entry is also available in:

Every day, more than 100,000 attacks targeting mobile devices are registered worldwide, either through fraudulent application downloads, connections to unsecured websites or compromised communications (email, voice and messaging).

Therefore, it is essential to have security solutions that allow protection of these devices, including BYOD or personal devices, which may be used for professional use.

However, it is necessary to take into account certain indications, in the form of good practices, so that the EPP system works properly:

  • Install the EPP applications required by the IT department.
  • Check with them that the two-factor authentication measures are working properly.
  • Ensure that we have an access lock to the terminal (PIN, fingerprint, facial fingerprint or similar).
  • Lock the different available applications with password or fingerprint.
  • Manage application privacy permissions (prevent uncontrolled tracking).
  • Use in all our connections, only WIFI networks that are secure and reliable.
  • Allow the geolocation of our device (associated to the EPP solution).
  • Disable the sending of statistics and recurring reports to (Android, Apple or various companies of installed apps).
  • Update software and patches on a regular basis.
  • Unify IT security, adapting our activity to corporate policies.
  • Do not download any application, document, file, without being sure of its reliability.
  • Encourage direct and transparent communication with the support team.
  • When in doubt, always rely on IT and cybersecurity experts.