Securing mobile devices are important for protecting corporate information from thieves, malicious attacks and the general public. Physical security, content security, device management and identity and access are four layers of security that protects sensitive data on mobile devices.Physical security is an important part of safeguarding information on mobile devices since it provides data encryption and multi-factor authentication. This means that whenever someone tries to access certain information contained within a mobile device they have to go through a series of PIN numbers, passwords and they must know a users name as well. Applying six digit automatically changing security codes is another type of feature that safeguards vital information. Firewalls are also important for mobile networks.Mobile devices can also be physically secured when not in use. Company networks and their employees should create difficult passwords and users names that are not easily decodable by outside sources. Security patches and updates must also be added on a regular basis by a company’s network. Devices should be turned off when not in use especially those that are used for file and printing sharing. Companies should take the time to remove important information form mobile devices if they decide to perform device upgrades or use a different model.Different types of intrusion prevention software can be installed on a mobile device in order to provide content security. Intrusion prevention software will stop unauthorized access to a mobile device by scrambling the information contained within the unit. Most intrusion prevention software is designed to prevent malware, content filtering and data loss. When employees access the internet from their mobile devices they should be required to use the highest security setting for their browser.Companies can also control the level of access that an employee has to information when they log onto their network. Most company departments and employees probably won’t need access to important and sensitive company information and they can be restricted to type of information that they can view. This type of security is called device management and it is necessary for controlling the functions that employees can perform remotely. Policies should also be in place that prevents employees from storing passwords, safe/door combinations and personal identification numbers on mobile units.Another security feature worth mentioning is storing all of the important information that is needed by departments and employees into one secure location. Once the information is centralized security measures can be increased to protect this area and this decreases the chances of important information from being compromised because it is spread out over many different areas.Identity and access permissions are important for creating specific settings and user profiles for each person. These access permissions can be set and adjusted for critical applications, folders, files or email. Administrators can also change employee and department user profiles and settings. Mobile providers that give a particular company access to a wireless network should have security measures in place for their Wi-Fi services. These four security protocols can significantly reduce the chances of being exploited by unauthorized sources.