Data security in the Everphone blog

More than a MDM: Mobile Threat Defense

Mobile identities in the workplace: why password security is essential for modern device fleets

Mobile Device Authentication

Mobile device authentication: A key element in preventing unauthorized access

Common mobile security threats

15 common mobile security threats and how to prevent them

Smartphones GenAI

The development of generative AI on smartphones: what can we expect in 2025?

Smishing

9 ways to prevent smishing on your mobile device

Unifed Endpoint Management UEM

What is Unified Endpoint Management (UEM)?

Remote Device Management

9 things you need to know about remote device management

Android Sicherheit /Android Security

Security for Android devices: Questions and measures

Xiaomi and data privacy—how secure are Chinese smartphones?

Mobile Device Management Policy

How to create an effective mobile device management policy

Remote Wipe

What you must know about remote wipe

Corporate Data Security

Why mobile security is more complicated than ever

Agreement for private use of work phones

Company phones: Private use and work phone agreements

A mobility strategy for work is vital for 21st century business

Face-ID_Security_iPhone_Apple-2

Mobile security: Does Face ID really work?

Dual-SIM_iPhones_Business

iPhones with 2 SIM cards make good business sense

MDM software: What to do before a company phone is stolen

Virus protection for company phones

Mobile-Device-Management-Anbieter

Do businesses need a Mobile Device Management supplier?

Company Phone Private Use Termination

What you should know about company phones, private use, and termination

security smartphone

Why phone security is a top priority today

Whatsapp-Business-Smartphone-Professionnel

WhatsApp on a company phone: Why is it a big no-no?

BYOD

BYOD phone policy—is it worthwhile for your company?

Secure Phone Disposal - Can You Recycle Your Smartphone?

Secure phone disposal—can you recycle your smartphone?

BYOD: Legal aspects to consider

Data Privacy On Phones

Data privacy on phones—protecting corporate devices

How can you whitelist smartphone apps for your business devices?

mobile device management samsung

Samsung Mobile Device Management: Choosing the right software

security app android

How security apps enhance Android devices

Mobile Phone Data Privacy: Backing Up Data from Company Devices

Mobile phone data privacy: Backing up data from company devices

Corporate Data Security

Enhance your corporate data security with MDM software

Smartphone manager

Smartphone managers: Securing your data

sophos mobile device management

Sophos Mobile Device Management in the corporate context

GDPR-and-Mobile-Device-Management

Mobile Device Management and GDPR

Antivirus-Smartphone

Why is virus protection on your work mobile useful?

company phone comparison

Company phone comparison: Know the differences

mdm mam mobile application management

What is mobile application management?

BYOD MDM

BYOD and MDM: Why private devices need an MDM for the job

Huawei data privacy concerns

mobile security & antivirus

What are the best mobile security & antivirus programs?

Android_Open-Source_MDM

What are the best open source MDM solutions for Android?

mdm smartphones

MDM for smartphones—why this is crucial for corporate security

BYOD

Is BYOA (bring your own app) here to stay?

Whatsapp GDPR

The GDPR WhatsApp saga or: How to become GDPR compliant

work phone whatsapp

Keep your work phone’s WhatsApp secure

virus-protection_smartphone

Phone virus protection: Let’s talk about It

data separation company phone

Data separation on company phones—why do you need it?

MDM COPE - mobile device management for personal use

MDM & COPE: The grand solution for company phones

mobile-device-management-small-enterprises

Mobile Device Management for small businesses

mdm gdpr

The use of MDM for GDPR compliance and its benefits