A threat actor was able to use a username and password to log in to a stolen company mobile device. Which of the following provides the best solution to increase mobile data security on all employees' company mobile devices?
I would go with B. Here is the reasoning, for an immediate response to a compromised device, remote swipe may be the best option. But the question asks "What is the best solution to increase mobile data security on all employee's devices?" Implementing FDE across all company devices raises the baseline security for the entire organization ensuring that data on all devices is protected. With compromised credentials a remote swipe might even be too late, if you don't find out fast enough that the device has been stolen.
This is wrong. Full disk encryption does not protect against malicious access if the attacker has a password. Otherwise, the user would not have access to their own files since they don't have the password.
A remote wipe is the only way out for a stolen device with stolen credentials.
B. Full disk encryption (FDE).
The question was not asking about the single phone that was stolen (in which case a remote wipe may work after the fact); rather, it asks for "the best solution to increase mobile data security on all employees' company mobile devices".
The correct answer is:
D. Containerization
Explanation:
Containerization is the best solution to enhance mobile data security in this scenario because it:
Creates a secure, isolated environment for company data and applications on mobile devices.
Ensures that even if a device is compromised, personal and corporate data remain segregated, reducing the risk to sensitive corporate data.
Allows for secure access and management of corporate resources without impacting personal data on the device.
Remote wipe allows an organization to erase all data on the device remotely, ensuring that even if a threat actor gains physical access and credentials, they cannot access the company data.
The answer is B. The question is what should they do to increase the security o n employees phone. The question is not saying what should they do. with the stolen phone!!
Even if a threat actor gains access to the device, they would still need to bypass additional authentication mechanisms to access the data within the container.
IT administrators can enforce security policies within the container, such as restricting copy/paste functions, disabling screenshots, and requiring strong authentication.
To those picking FDE because you wouldn't wipe all users' phones, this is missing the boat. You are implementing a remote wipe solution, NOT wiping everyones' phones. Given the example provided, I can't see anything but C being correct here.
It says "on ALL employees devices" You aren't going to full wipe every employees mobile devices when only one has been infiltrated. Full disk encryption will increase security going forward.
I'm gonna keep it short here because Ty already explained it perfectly, but it's not B.
"If someone steals a phone AND has your credentials, the device has already been pwned" and remote wiping the stolen device is pretty much your only option. You just have to hope it gets reported and the security team gets to it fast enough. There are other measures they could have taken beforehand that would make the attacker having the username and password less devastating. This would be a big "oops" moment, all you can do is damage control.
'Data Protection: Full disk encryption (FDE) encrypts all data stored on a mobile device, ensuring that even if the device is lost or stolen, the data remains inaccessible without the proper authentication key (e.g., a password or PIN). This is crucial for protecting sensitive company information from unauthorized access'
The answer is remote wipe because the device has already been accessed using the user name and password'
C. Remote Wipe
Anyone who understands MDM would be able to answer this immediately. Phones are already encrypted - whether it's Android or Apple - otherwise your phone would be a disastrously vulnerable computer. If someone steals a phone AND has your credentials, the device has already been pwned and you have no option but to remote wipe it and hopefully stop them from accessing any further info.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
a4e15bd
Highly Voted 5 months agoEfaChux
4 months, 4 weeks agojafyyy
4 months, 3 weeks agojsmthy
3 months, 2 weeks agob82faaf
Highly Voted 5 months agojbmac
Most Recent 1 week, 6 days ago1f2b013
3 weeks, 6 days ago0ca8ee9
1 month agoviktorrdlyi
1 month, 1 week agoTriBiT
1 month, 2 weeks agocyberWoof
2 months ago3dk1
2 months, 1 week ago3dk1
2 months, 1 week agoe157c7c
2 months, 2 weeks agoMurtuza
2 months, 3 weeks agopaytenj10
2 months, 3 weeks agoc7b3ff0
2 months, 3 weeks agofamuza77
2 months, 3 weeks agodhewa
3 months agoMich06
3 months, 1 week agoTy13
3 months, 2 weeks ago