Mobile Device Security

Organizations understand the value that mobile devices can add to their employees’ productivity by providing access to business resources at any time. Not only has this reshaped how traditional in-office tasks are accomplished, but organizations are devising entirely new ways to work. Yet, a compromised mobile device may allow access to sensitive organizational data, or any other data that the user has entrusted to the device. With this in mind, NCCoE's mobile device security efforts are dedicated to helping solve organizations’ most pressing mobile cybersecurity challenges. 

Security Guidance

Featured Resource

Mobile Threat Catalogue

The Mobile Threat Catalogue identifies threats to mobile devices and associated mobile infrastructure to support development and implementation of mobile security capabilities, best practices, and security solutions to better protect enterprise IT. Threats are divided into broad categories, primarily focused upon mobile applications and software, the network stack and associated infrastructure, mobile device and software supply chain, and the greater mobile ecosystem. Each threat identified is catalogued alongside explanatory and vulnerability information where possible, and alongside applicable mitigation strategies.

This is living document and we continue to appreciate your feedback. Please consult NISTIR 8144: Assessing Threats to Mobile Devices & Infrastructure for context and background information.


View the Catalogue
Mobile phone personal data and cyber security threat concept

Learn More About Our Efforts

Mobile devices offer convenience and flexibility for organizations. This video provides an overview of how the NCCoE’s efforts can help organizations improve their mobile device deployments, while taking into consideration their security and privacy needs.

Join the Community of Interest

A Community of Interest (COI) is a group of professionals and advisors who share business insights, technical expertise, challenges, and perspectives to guide NCCoE projects. COIs often include experts, innovators, and everyday users of cybersecurity and privacy technologies. Members typically meet monthly be teleconference. Share your expertise and consider becoming a member of this project's COI. 

Request to Join
Employee speaking on video call with colleagues on online briefing with laptop at home

Related Materials