The beginner’s guide to MDM

Learn how to protect and manage your mobile devices with this step-by-step guide covering everything from planning groups and creating policies, to reporting.

Download Now
infographic Device Management

A Legal Defense: Five Steps to an Effective Mobile Device Policy for Law Firms

Smartphones provide many benefits to law firm employees, including helping them stay connected and providing access legal documents on-the-go. However, firms must have a solid mobile device policy that puts security at the forefront. If a device is hacked or lost, it can have serious repercussions for legal firms who are reponsible for protecting their clients’ confidential and highly sensitive data.

First and foremost, law firms must provide employees with security awareness training to ensure they understand the security risks and have clearly communicated the mobile device policy. The use of enterprise mobility management tools is also essential. Within the legal sector, the bring-your-own-device, or BYOD, policies are less favored than the use of corporate-issued devices. By issuing company devices, IT has greater control and can also deploy separate containers for personal and corporate data, such as Knox Workspace. Finally, firms must ensure that apps are managed strategically to mitigate security issues such as malware.

Check out the infographic below or visit our solutions page to learn more about these key mobile security tactics and how law firms can use them to enhance employee productivity.

A Legal Defense – Five Mobile Security Tactics for Legal Firms from Samsung Business USA

Posts By

Fran Howarth

Fran Howarth is an industry analyst specializing in security. She has worked within the security technology sector for over 25 years as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include mobile security, cloud security, information governance and data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations. Follow Fran on Twitter: @FranNL

View more posts by Fran Howarth