Top 5 Android security tips for the enterprise

Keep your device secure by following these simple steps which include using Android's encryption features and Google's Device Policy app.

With Google's Android operating system proving popular with consumers due to the wide variety of form factors and price points, it is inevitable enterprises will deploy the OS.

Android's flexibility and openness presents IT admins and users with a challenge in keeping devices and data secure. As Google's OS can be tightly woven with sensitive enterprise data such as messaging, contact details and documents, it is important to not only keep smartphones or tablets secure but be able to control access should it be lost or stolen.

IT Pro provides you with five simple tips to help keep Android devices secure and reduce the headache if a device is compromised.

5. Steer clear of open Wi-Fi networks

We've all been tempted to join one. But open Wi-Fi networks usually don't work or can be a trap to capture sensitive data.

Advertisement - Article continues below
Advertisement - Article continues below

Android can be set to connect automatically to open Wi-Fi hotspots with the aim of offloading data transfer from expensive 3G networks to higher bandwidth Wi-Fi links. All data sent over unencrypted, open Wi-Fi networks can be captured and read with the bare minimum of work.

The best thing to do is to steer clear of open Wi-Fi hotspots. If the need arises, make sure a virtual private network (VPN) connection has been setup to guard against packet sniffing.

A VPN connection creates an encrypted tunnel to a known secure machine. However users wanting to keep a VPN tunnel active at all times will generate considerable bandwidth and drain battery life, therefore it is imperative that both VPN and open Wi-Fi connections are initiated by the user.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019