Screen locks
Locator applications and remote wipe
Remote backup
Anti-virus and Anti-malware
Patching/OS updates
Biometric authentication
Authenticator apps
Trusted vs. untrusted sources
• iOS
• All apps are curated by
Apple
Firewalls
Policies and procedures
• Manage access control
• Force screen locks and PINs on these single user
devices
What is the name of a policy that allows employees to use private mobile devices for accessing company’s restricted data and applications?
BYOD
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
COPE
Allowing “Unknown Sources” in Android security settings enables:
Sideloading
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:
Sideloading