Tips
Tips
-
How to address mobile compliance in a business setting
When organizations plan for compliance and data security, they need to consider mobile devices due to their proliferation in a business setting and how easy it is to lose them. Continue Reading
-
How to troubleshoot when a hotspot is not working on Android
Troubleshooting mobile hotspots on Android devices requires IT to put in the documentation, training and practices to best help remote and hybrid users. Continue Reading
-
How to fix an iPhone Personal Hotspot that's not working
Connectivity issues, misconfigured settings and human error can all cause mobile hotspot problems. IT and users must know how to avoid and fix these issues for remote work. Continue Reading
-
How to exit kiosk mode on any OS
Manually exiting kiosk mode is still necessary in the age of mobile device management for convenience and when it's time to remove kiosks at their end of life. Continue Reading
-
Getting started with kiosk mode for the enterprise
A kiosk can serve several purposes as a dedicated endpoint. Understanding those possibilities and their benefits and challenges is key to deploying kiosk mode for the enterprise. Continue Reading
-
How to detect and remove malware from an iPhone
Despite their reputation for security, iPhones are not immune from malware attacks. IT and users should learn the signs of mobile malware and the steps to take when they appear. Continue Reading
-
How to detect and remove malware from an Android device
Mobile malware can come in many forms, but users might not know how to identify it. Understand the signs of malware on mobile devices, as well as what to do to remove the threat. Continue Reading
-
How to set up kiosk mode for iPad and other OSes
Tablet-based kiosks became increasingly popular for customer self-service during the pandemic. Organizations managing multiple kiosks need to understand how to set up kiosk mode. Continue Reading
-
How to protect mobile devices from malware in the enterprise
Smartphones can be just as susceptible to cybersecurity threats as desktops, so it's important for organizations to know how to protect their endpoints from mobile malware. Continue Reading
-
How to create a mobile device management policy for your org
A mobile device management policy creates several essential benefits for an organization, like security measures and data and application guidelines for corporate information. Continue Reading
-
How to use the iPadOS file manager in the enterprise
Organizations can use the iPadOS Files app to manage files locally or in the cloud. Learn the pros and cons of both storage types and how to use them in the native file manager. Continue Reading
-
How does enterprise file management in iOS work?
It's important to ensure that files are secure and easy to work with on enterprise mobile devices. In iOS, the Files app is a key tool for personal and corporate file management. Continue Reading
-
What are the best file managers for Mac devices?
If the native macOS file manager is lacking, IT can look to third-party options for advanced features. Commander One, ForkLift and Path Finder are three alternatives to consider. Continue Reading
-
How to ensure iPhone configuration profiles are safe
Configuration profiles make it easier to manage BYOD iPhones, but they're also associated with malware. Mobile security policies can ensure configuration profiles are safe. Continue Reading
-
How to remove a management profile from an iPhone
User Enrollment creates a management profile for BYOD iPhones, but IT must remove that data in cases such as device loss or theft. Learn how to do this with a selective wipe. Continue Reading
-
How to enable User Enrollment for iOS in Microsoft Intune
User Enrollment in iOS can separate work and personal data on BYOD devices. IT teams should learn how to enable it in Microsoft Intune and how it can affect user experience. Continue Reading
-
How to restore a deleted Android work profile
If a user deletes an Android work profile or switches devices, they will need to go through the process to restore it. Learn the simple steps to reenroll an Android work profile here. Continue Reading
-
Does Apple offer work profiles for iPhones?
Apple uses data and device containerization -- instead of the Android Work Profile model -- to split work and personal information on iPhones and support BYOD deployments. Continue Reading
-
How to delete or disable an Android work profile
When users leave an organization or lose a device, it's time to remove their Android work profile. Learn three methods to get rid of a work profile on a BYOD device. Continue Reading
-
How long can smartphones last in the enterprise?
Many organizations aim to use the smartphones they've invested in for as long as possible, but outdated or malfunctioning devices present risks that can cost more in the long run. Continue Reading
-
How to create a work profile on Android devices
When organizations enable BYOD for Android users, they should look to Android Enterprise to create work profiles on those personal devices via an MDM. Continue Reading
-
How long should you support Android phones in the enterprise?
The Android OS can run on a wide range of devices, but how long should enterprise organizations support Android phones? Find out which factors help determine the lifecycle length. Continue Reading
-
Understanding how long iPhones can last in the enterprise
Organizations may want to use the devices they invest in for as long as possible, but how long does Apple support iPhones? Explore the factors that affect the lifespan of iPhones. Continue Reading
-
How organizations should handle mobile device lifecycles
Understanding the mobile device lifecycle can help IT manage endpoints from purchase to retirement, with different tools and processes supporting devices at different stages. Continue Reading
-
How does Android 13 work profile improve IT management
When users bring personal Android devices to the workplace, IT should consider using work profiles on these devices. Learn about the latest work profile features on Android 13. Continue Reading
-
Finding the best cellphone plans for small businesses
A business mobile plan is common in the enterprise, but the picture isn't as clear for SMBs. If an SMB opts to purchase a phone plan, there are many options to choose from. Continue Reading
-
5 MDM features and platforms for small businesses
When SMBs deploy mobile devices, they need to find a viable MDM that can meet their needs. Read about 5 key features to look for in an MDM and some strong choices for vendors. Continue Reading
-
How small businesses can pick the right mobile devices
To cash-strapped SMBs, deploying mobile devices may seem excessive. However, mobile devices are valuable tools to increase communication and productivity for business users. Continue Reading
-
Preventing attacks on mobile applications in the enterprise
As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks that come with mobile apps and how to mitigate them. Continue Reading
-
Top mobile apps for SMBs
While there are many options for mobile applications that can help enterprise organizations accomplish business goals, some options are better suited for SMBs. Continue Reading
-
Understanding QR code security issues for enterprise devices
QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Continue Reading
-
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises. Continue Reading
-
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace. Continue Reading
-
How to perform a full remote wipe on an iPhone
A remote wipe is a vital security tool as mobile devices become more common in the workplace. In organizations allowing work data on iPhones, IT should know the iOS wipe options. Continue Reading
-
How to create a mobile app for a small business
Regularly updated mobile applications are becoming essential for small businesses. The first step for SMBs is knowing all the options for building and maintaining mobile apps. Continue Reading
-
How to perform a remote wipe of Office 365 on a smartphone
Employees like having email and other Office 365 applications on their smartphones. There are security risks that come with mobile devices accessing corporate data, however. Continue Reading
-
The role of mobile email management in the enterprise
Mobile email management is a key facet of overall mobility management and, when properly deployed, will streamline functions and create a more secure environment. Continue Reading
-
How to add an Apple TV to Apple Business Manager
Apple Business Manager can provide some basic management functions for Apple TVs, and organizations need to make sure they configure the device properly. Continue Reading
-
Finding the right Apple TV management software
When organizations deploy Apple TV for digital signage or displaying business data, the IT department can't overlook the management of these devices. Continue Reading
-
How and when to set up Apple TV with a business account
While organizations can use a business Apple ID account, there are other options -- a personal Apple ID or even no Apple ID may suffice. Continue Reading
-
What role can Apple TV serve within a business?
Apple TV can do a lot more than just stream movies to your TV. Learn how this set-top device can handle numerous multimedia tasks in a business setting. Continue Reading
-
How to evaluate mobile application management software
Finding the right mobile application management tool is about its features and what the organization needs to efficiently use them. Continue Reading
-
What can organizations do to address BYOD privacy concerns?
BYOD conveniently puts work and personal data on one device, but this creates privacy concerns. Organizations should take steps to ensure both employee privacy and device security. Continue Reading
-
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading
-
A guide to enrolling Apple devices in Jamf
Organizations should consider management platforms from specialized vendors, such as Jamf, for specific OSes including Apple iOS. Learn how to enroll Apple devices into Jamf here. Continue Reading
-
How text message phishing can affect the enterprise
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices. Continue Reading
-
Protecting mobile devices from text-based phishing
Phishing emails often get IT teams' attention, but text-based phishing is a growing threat. Organizations must understand the risks of mobile phishing and how to prevent it. Continue Reading
-
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
-
Integrating Android Enterprise with Intune device management
Organizations that deploy Android devices should look to Android Enterprise APIs to provide control of managed devices, but they require integration with a management platform. Continue Reading
-
Mobile application management tools balance service and cost
Finding the right mobile application management tool can be challenging. Discover whether it's best to choose a standalone MAM tool over an integrated EMM suite. Continue Reading
-
How Intune fits into the Microsoft Endpoint Manager console
The Microsoft Endpoint Manager platform provides organizations with a centralized console for numerous Microsoft services, and IT admins should learn how Intune fits into this. Continue Reading
-
Evaluating Apple Configurator and its alternatives
IT's first step to deploy mobile devices is to configure them, so organizations will have to decide if Apple Configurator is enough or if they'll need more advanced features. Continue Reading
-
How to enroll iOS devices with Apple User Enrollment
A recently added Apple feature, iPadOS and iOS User Enrollment, helps organizations manage devices with personal data without sacrificing end users' privacy. Continue Reading
-
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither. Continue Reading
-
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
-
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with multiple ways to steal data. These threats -- from network spoofing to phishing texts -- endanger companies as much as individuals. Continue Reading
-
How to deploy configuration profiles on iOS 14 and later
While mobile IT admins can deploy iOS configuration profiles manually or ask users to handle that task, they should learn how to handle mass profile deployments as well. Continue Reading
-
The best Windows tablets for business in 2021
There are plenty of viable Windows tablets for business tasks, but each tablet has unique features and components that purchase decision-makers will have to evaluate. Continue Reading
-
Compare Android Enterprise vs. Android Device Administrator
In most cases, Android Enterprise will serve for organizations' Android management needs, but IT admins should understand how Android Device Admin fits into the picture. Continue Reading
-
Evaluating the iPhone 12 as a business phone
Organizations that rely on mobile devices have likely considered the iPhone as a business phone for its users, so they should evaluate the latest enhancements with the iPhone 12. Continue Reading
-
Improve mobile hotspot security in 5 steps
Users may not hesitate to connect to a mobile hotspot, but that doesn't mean IT should always allow it. Learn the threats these hotspots pose and how to handle them. Continue Reading
-
Manage mobile operating system updates with Intune
Mobile administrators should enforce certain platform version minimums through mobile OS update policies for their devices, and Intune has a broad feature set to support this task. Continue Reading
-
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below. Continue Reading
-
Mobile device convergence brings security challenges
The trend of mobile device convergence, adding more functionality to smaller hybrid devices, is growing in intensity with the COVID-19 pandemic, and IT must be prepared for it. Continue Reading
-
New iOS 14 features that mobile admins should be excited for
With the impending release of iOS 14, mobile admins should learn the advancements that iOS 14 can offer and how the features can make a major difference in the enterprise. Continue Reading
-
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
-
Top iOS 13 mobile device management features for IT
The new iOS 13 mobile device management features Apple introduced help IT with device enrollment and other tasks, but IT must determine how these features fit into its plans. Continue Reading
-
How event-driven architecture benefits mobile UX
Event-driven architecture is an approach to programming that enterprise IT professionals should understand. This approach benefits both IT and mobile users. Continue Reading
-
Determine 5G enterprise use cases, cost before deployment
There's a lot of hype surrounding 5G. Before getting too excited, it's important to determine the enterprise use cases, costs and what organizations must do to take advantage of 5G. Continue Reading
-
Evaluate the foldable mobile phone market for the enterprise
As more foldable mobile devices come to market, IT pros should familiarize themselves with the available models and evaluate if they're a worthwhile investment. Continue Reading
-
Create a mobile BYOD policy for the coronavirus pandemic
The COVID-19 pandemic is forcing organizations to support remote work whenever possible. Organization can follow a few key steps to enable productive remote work on mobile devices. Continue Reading
-
Understanding the features of Android enterprise device management
Don't get overwhelmed when managing Android devices in the enterprise. Check out this cheat sheet to understand and use features that make device management a breeze. Continue Reading
-
7 enterprise policies that enhance mobile user experience
Mobile admins must prioritize the mobile user experience they provide on their mobile fleet by deploying policies such as IT approving app permissions and single sign-on. Continue Reading
-
5 strategic steps to blunt mobile device security threats
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it. Continue Reading
-
How to configure Outlook on mobile devices with Intune
Intune admins must know how to enable mobile users' needs, including having quick access to Outlook. Learn the five steps that IT must take to configure Outlook on mobile devices. Continue Reading
-
Standardize mobile UI with Microsoft Launcher for Android
The Microsoft Launcher for Android functionality in Intune allows IT to provide a single UI for its Android devices. IT can configure it with JSON or Configuration Designer data. Continue Reading
-
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management. Continue Reading
-
What Android security threats should IT know about?
Mobile admins must understand the nature of the most recent Android security threats so they can protect users, but it's crucial to know where these verified threats are listed. Continue Reading
-
Surface Duo brings a Windows Surface-Android partnership
The new Windows Surface Duo device promises a marriage of Google Android and Microsoft hardware, and organizations should learn how the device could help their mobile users. Continue Reading
-
Explore Android OS alternatives for enterprise use
While enterprise adoption for Android OS alternatives, IT professionals should learn about the options available so they can weigh the different features and apps available. Continue Reading
-
8 MobileIron features that EMM admins should know
IT professionals should make the most of their EMM platform by learning the potentially overlooked features. MobileIron admins should learn about the following eight features. Continue Reading
-
4 factors that should shape a BYOD mobile policy
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
-
Enterprise wearables bring benefits, management challenges
Enterprise mobility isn't just about smartphones and tablets. Wearable device adoption is growing, so IT should be ready to support this dynamic category of mobile devices. Continue Reading
-
How to install root CA certificates on iPhones and iPads
Apple iPads and iPhones can connect securely to enterprise networks, but IT admins need to install root certificates or CA certificates to the devices first. Continue Reading
-
Evaluate Intune alternatives for mobility management
Intune stands out in the EMM market in part due to its incumbency as a PC management platform. IT must evaluate Intune compared to other EMM and UEM platforms' mobility controls. Continue Reading
-
Deploy kiosk devices with the Managed Home Screen Android app
The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best Managed Home Screen Android management options. Continue Reading
-
Develop a strong smartphone policy for the enterprise
Organizations with managed mobile users need to develop a smartphone policy, on everything from data use to app installation, to ensure security and smooth business processes. Continue Reading
-
Google OEM config program enables quick updates to EMM
Google's OEM Config program incentivizes Android smartphone OEMs to help EMM vendors quickly support device-specific management features by uploading APIs to the Google Play Store. Continue Reading
-
How to manage Office 365 mobile apps for business
Microsoft Office 365 applications allow users to send emails and edit numerous types of documents, but the mobile apps present a number of adoption issues that IT should learn about. Continue Reading
-
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Continue Reading
-
Intune mobile device management features for Android 10, iOS 13
The Intune mobile device management features that IT can deploy differ based on which mobile OS users run. The latest versions of iOS and Android add to the list of differences. Continue Reading
-
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns. Continue Reading
-
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors. Continue Reading
-
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns. Continue Reading
-
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data. Continue Reading
-
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for. Continue Reading
-
How the Intune App Wrapping Tool works for Android
Mobile application wrapping is an effective way to deploy policies that can't normally interact with an app. Learn how IT can use Intune's wrapping tool on Android apps. Continue Reading
-
Apple and Google simplify BYOD management with new OSes
IT must weigh user privacy and endpoint security when it shapes its BYOD policies. Luckily, new features in iOS 13 and Android Q make this balance easier for IT to strike. Continue Reading
-
Pros and cons of smartphone sensor data analysis
With the help of smartphone sensor data, IT can learn about its users' behaviors and improve operations and workflows, but collecting this data has some notable risks as well. Continue Reading
-
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading