Skip to main content

Mobile Device Security

Deployment Models

ModelDescription
BYODBring Your Own Device — employee uses personal device to access org resources
COPECorporate-Owned, Personally Enabled — company device used as personal
CYODChoose Your Own Device — employee picks from a limited set of company-approved devices

MDM (Mobile Device Management) — centralized management and monitoring platform for all mobile device security. Required at scale.


Security Baselines for Mobile

  • Strong authentication + MFA
  • Security patching and OS updates
  • Device encryption
  • Block jailbroken and rooted devices
  • Containerization / sandboxing for corporate data
  • Attribute-based or conditional access controls

Connection Methods & Risks

Cellular

  • Generally more secure than public Wi-Fi
  • Satellite cellular adds an additional layer

Wi-Fi (802.11x)

  • Avoid public hotspots — use VPN if required
  • Disable auto-connect to open networks
  • Verify connections are to trusted networks only

Bluetooth (802.15)

  • Disable when not in use
  • Can be exploited via bluejacking, bluesnarfing, MITM attacks

NFC (Near-Field Communication)

  • Range: 1–4 cm
  • Used for payments and small data transfers
  • Disable when not in use

VPN Tunneling Protocols

ProtocolNotes
PPTPLegacy, weak encryption — avoid
SSTPWindows-focused, uses port 443 (firewall-friendly)
L2TP/IPsecWidely adopted, strong encryption
IKEv2Best for mobile — handles unstable connections, fast reconnects

MDM Key Controls

Enforce screen lock / PIN policy
Remote wipe capability
Certificate-based device authentication
App whitelist / blacklist enforcement
VPN enforcement for corporate access
Geofencing and location controls
Jailbreak / root detection
Separate corporate container from personal data