Back in February of last year, we issued a blog post on device location reporting, a topic that often comes up among our AirWatch users. Last week, we received the following email from a client working to troubleshoot an issue that arose when trying to configure this popular functionality.
As per your article, I have set up for automatic request to check in for devices. I can see devices last seen but when I got to the location tab it says the device has not reported any location to AirWatch.
In case you run into a similar issue, we wanted to share some additional tips for ensuring that you can track your devices via GPS Location Services as noted in our response to the client:
I am glad to hear that you read the article and applied it to your environment. There are a couple of things that could be causing the disconnect:
- The Privacy settings in All Settings/Devices and Users/General/Privacy must be set properly for your use types (either BYOD or Company Owned).
- The Agent settings for the device OS (Apple or Android) should be set to have the Background Refresh checkbox checked (for example, All Settings/Devices and Users/Apple/Apple iOS/Agent).
- Location Services must be turned on for the device.Â For Apple devices, tap Settings on the home screen and then Privacy/Location Services, making sure that the AirWatch Agent is listed under the “Share My Location” section. Unless you have your devices managed under a DEP profile, you won’t be able to mandate that the user doesn’t turn that off on his/her own.
I hope the above helps. If you have any further issues or any questions regarding details, you may consider creating a support ticket with AirWatch.
Randy Crenshaw, VP â€“ Mobile Technology
Tech Orchard, LLC
Do you have a question about your AirWatch console we can answer? Or, are you interested in learning tips about a specific mobility issue? Email Randy at firstname.lastname@example.org for assistance and you could be featured in an upcoming blog post.
As we move more of our work and personal lives digital and carry all of it in our pockets, the struggle to secure your smartphone can often feel daunting and confusing. If you follow a few simple steps, you can protect yourself from the vast majority of threats that existâ€”both physical and digital.
Here are seven easy ways to secure your smartphone, plus a few special considerations for enterprise IT folks.
- Disk Encryption
In the event that your device is lost or stolen, encrypting your device prevents malicious actors from getting your private information. If you use an iOS device, automatically encrypt your phone by setting up a pin or passcode. If you use an Android device, head into your settings pane and setup full disk encryption. Android links a password or passcode to the encryption scheme, so even if someone were to copy your data, it would be useless.
- Automatic Updates
Apps make it easy to get work done, keep up with friends and play games on the go. Unfortunately, sometimes these apps leak information or expose vulnerabilities. Set your phone to auto-install new app updates to avoid security risks. An added benefit is that oftentimes these updates include speed improvements and new features.
- Up-To-Date Operating System (OS)
Apple and Google constantly make improvements to iOS and Android. Throughout the year, both release new OS versions. Download these updates as soon as available to take advantage of new security improvements, which often reduce the threat surface for attackers and remove known vulnerabilities.
- Screen Lock
Physical security is just as important as good digital hygiene. Since most devices today include biometric capabilities, like TouchID or other fingerprint readers, the pain of constantly entering your device password is gone. Set your screen to lock with the minimum amount of time available on your deviceâ€”oftentimes 30 seconds. This will prevent someone from grabbing your phone and accessing your data if you step away from your device.
Some dubious websites provide guidance on how to root (Android) or jailbreak (iOS) your device. This allows you to customize your device more than the manufacturer intended. While this might seem nice at first, this compromises the entire security model of the phone and exposes you to malicious actors and security vulnerabilities. By rooting or jailbreaking your device, you could give someone complete control and access to your data without even knowing it. Avoid jailbreaking or rooting your device.
- Malicious Profiles
Configuration profiles allow your corporate IT department or school to make it easier to access specific resources, like email on your smartphone. Sometimes, nefarious websites attempt to install a profile without you knowing. Questionable websites claim to offer free access to apps, games, movies or other content to install a configuration profile on your device. These malicious profiles can give full access to your device and web traffic. Avoid installing configuration profiles that do not come from your corporate IT department or school.
- Avoid Insecure Public Wi-Fi
Using public Wi-Fi is a great way to get mobile access to the web and email without using your data plan. Unfortunately, malicious actors can snoop on this traffic from your mobile device. To prevent this, avoid using unknown public Wi-Fi when possible or use a free solution like Opera VPN. Opera VPN and similar apps are available in app stores and encrypt traffic moving from your mobile device. This means no one can snoop.
Special Considerations for Enterprise IT Administrators
If our organization runs a bring-your-own-device (BYOD) program, provides corporate-owned devices to employees or you are responsible for managing these devices within your organization, take note of some ways you can ensure security for your organization and employees:
- Use a product purpose built for managing mobile devices.
VMware AirWatchÂ is a unified endpoint management (UEM) platform that allows your corporate IT department to manage iOS, Windows, Mac, Android and other devices in a single solution. AirWatch provides all of the tools IT needs to create and manage a mobility program:
- Configure policies including app blacklists, Wi-Fi security, TLS enforcement and more.
- Enforce a device-level passcode with complexity and history requirements.
- Revoke access to company apps and data automatically if compliance policies are violated.
- Enable device-level encryption, data encryption and hardware security policies.
- Enforce containerization of business apps and data using native OS controls.
- Monitor for malware threats or jailbroken devices and automatically remediate with a remote lock, device wipe or customizable device quarantine controls.
- Use an identity and access management solution with single-sign on (SSO) capabilities.
Reduce password pain for end users and strengthen your organizations security posture with an integrated identity and access management solution.Â VMware Workspace ONEÂ combines identity and access management with UEM. This powerful combination eliminates the need for complex passwords with single sign-on (SSO), a unified app catalog and endpoint management powered by AirWatch.
This article originally appeared on the AirWatch blog.
Protecting your privacy and keeping data secure on a computer, whether running a Windows, Mac or other operating system, is more important than ever in todayâ€™s internet and cybersecurity environment.Â Many Apple users assume that the Mac OS is more secure and less prone to exposure. While partially true, the reality is no OS is totally immune from phishing attempts, man-in-the-middle attacks, malware-infected applications, or internet and email links to unsafe web pages. However, you can do more than you think to protect yourself and your Mac by taking control of some key system settings and paying attention to your computing habits.
As cybersecurity presents an increasingly complex and concerning environment for personal, business and government safety, attention to the secure use of mobile devices is more important than ever for individuals around the world. In fact, recent news of cybercriminals and hackers having connections deeply rooted in the Russian government, as well as the thousands of unauthorized â€śapp storesâ€ť hosted in China, has underscored the growing number of threats in existence â€” and therefore a clear need to be proactive.
Since 2004, October has been recognized asÂ National Cybersecurity Awareness Month (NCSAM).
The initiative for the recognition was spearheaded by the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS).Â During the month of October, those government agencies are joined by the nonprofit National Cyber Security Alliance (NCSA) in encouraging Americans to be vigilant about computer and internet use.