8 iPhone Security Apps To Keep Your Data Safe - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile // Mobile Applications
07:06 AM
Nathan Eddy
Nathan Eddy

8 iPhone Security Apps To Keep Your Data Safe

Keeping your iPhone safe from cracked screens and dings on the outside is hard enough, but with the rise of malware and hackers targeting your precious smartphone, you have to think about securing what's inside. Here are some apps to help you do that.
1 of 9

It's hard enough to keep the outside of your iPhone safe -- let us tally up the number of brand-new iPhone 6s models we've seen sporting cracked screens and chipped corners -- and keeping the information on the inside of these smartphones can be just as hard, if not harder -- especially when the damage is not immediately visible.

With the increased adoption of mobile commerce and mobile banking services, along with malware distributors and hackers becoming savvier and more powerful, smartphone users are more vulnerable than ever.

However, mobile threats don't just concern individual users. They impact organizations large and small with potentially devastating results.

According to a recent survey of 100 global IT leaders by Lookout, a mobile security vendor and research firm IDG, nearly three-quarters of organizations have experienced a data breach as a result of a mobile security issue.

More than eight in ten (82%) said the majority of their corporate data is accessible to users through mobile devices, and a stunning 95% said they believe that data on or accessed by mobile devices brings increased risk of a data breach.

[See 10 iPhone, iPad Apps Optimized for iOS 9.]

"It's important for organizations to recognize they need to place the same effort and attention to mobile security as they did laptops or even desktops," Aaron Cockerill, vice president of products at Lookout, told InformationWeek. "In terms of technology investments in mobile security, organizations should first recognize that perimeter-based security does not work for a borderless, mobile workplace."

Whether you're using a corporate mobile device, your own device for businesses purposes, or simply using your iPhone for personal shopping, banking, or downloading files, it's important to make sure you've got your information protected.

 We've assembled this list of iPhone apps that will help give you piece of mind, and more importantly, protect your smartphone -- and the data inside -- from the prying digital eyes of the malicious Internet set.

(All Images: Apple)

**New deadline of Dec. 18, 2015** Be a part of the prestigious InformationWeek Elite 100! Time is running out to submit your company's application by Dec. 18, 2015. Go to our 2016 registration page: InformationWeek's Elite 100 list for 2016.

Nathan Eddy is a freelance writer for InformationWeek. He has written for Popular Mechanics, Sales & Marketing Management Magazine, FierceMarkets, and CRN, among others. In 2012 he made his first documentary film, The Absent Column. He currently lives in Berlin. View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 9
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Remote Work Tops SF, NYC for Most High-Paying Job Openings
Jessica Davis, Senior Editor, Enterprise Apps,  7/20/2021
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
Flash Poll