{"id":137237,"date":"2023-05-04T05:53:14","date_gmt":"2023-05-04T05:53:14","guid":{"rendered":"https:\/\/www.kdanmobile.com\/blog\/?p=137237"},"modified":"2024-11-29T07:00:04","modified_gmt":"2024-11-29T07:00:04","slug":"mobile-security","status":"publish","type":"post","link":"https:\/\/www.kdan.com\/blog\/mobile-security","title":{"rendered":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work"},"content":{"rendered":"\n<p>Around 59% of US workers who can do their jobs from home report that they usually utilize a work-from-home setup nearly all the time. While remote work is not as prevalent now as it was at the height of the COVID-19 pandemic, it is still much higher than before the lockdown.&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>This comes as no surprise, considering that workers are (on average) <a href=\"https:\/\/www.forbes.com\/sites\/forbescommunicationscouncil\/2023\/03\/14\/the-rise-of-remote-work-and-how-to-handle-a-remote-first-team\/?sh=411c60213cb7\" target=\"_blank\" rel=\"noreferrer noopener\">more productive<\/a> when working from home than in the office. Three years after the onset of the pandemic, it seems that remote work is here to stay.&nbsp;<\/p>\n\n\n\n<p>While remote work has numerous benefits, it does create issues on two fronts: mobile device security and privacy.&nbsp;<\/p>\n\n\n\n<p>Fortunately, there are many ways you can improve security in the age of remote work! In this guide, we\u2019ll give you nine ways to help boost mobile security, whether you\u2019re a freelancer or the CEO of a remote-first startup.&nbsp;<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#What_Is_Mobile_Device_Security\" >What Is Mobile Device Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#The_Importance_of_Mobile_Device_Security\" >The Importance of Mobile Device Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#How_to_Improve_Mobile_Device_Security\" >How to Improve Mobile Device Security<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#1_Develop_a_standard_cybersecurity_policy\" >1. Develop a standard cybersecurity policy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#2_Train_employees_on_mobile_device_security\" >2. Train employees on mobile device security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#3_Use_secure_network_connections\" >3. Use secure network connections<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#4_Keep_an_eye_on_your_mobile_devices\" >4. Keep an eye on your mobile devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#5_Encourage_the_use_of_password_managers\" >5. Encourage the use of password managers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#6_Use_2-factor_authentication\" >6. Use 2-factor authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#7_Utilize_encryption_software\" >7. Utilize encryption software<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#PDF_Reader\" >PDF Reader<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#8_Keep_your_systems_updated\" >8. Keep your systems updated<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#9_Properly_dispose_of_hardware\" >9. Properly dispose of hardware<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_Mobile_Device_Security\"><\/span>What Is Mobile Device Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Before diving into the different ways to improve security and privacy, let\u2019s briefly describe mobile security and privacy.&nbsp;<\/p>\n\n\n\n<p>Mobile device security encompasses all processes and frameworks in place to ensure data remains secure on your mobile device. For the purpose of this discussion, mobile devices pertain to any of the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Laptops<\/li>\n\n\n\n<li>Tablets<\/li>\n\n\n\n<li>Smartphones<\/li>\n<\/ul>\n\n\n\n<p>If you can bring it around with you and it isn\u2019t connected to your office physically, you can consider it a mobile device.&nbsp;<\/p>\n\n\n\n<p>You can have security practices in place whether you are a rank-and-file employee at a tech startup or <a href=\"https:\/\/intellias.com\/payments\/\" target=\"_blank\" rel=\"noreferrer noopener\">payments consulting<\/a> business or if you\u2019re a freelancer running your own consulting business.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Importance_of_Mobile_Device_Security\"><\/span>The Importance of Mobile Device Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-hands-holding-smartphone.jpg?ssl=1\"><img data-recalc-dims=\"1\" height=\"560\" width=\"840\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-hands-holding-smartphone.jpg?resize=840%2C560&#038;ssl=1\" alt=\"\uff2dobile device security\" class=\"wp-image-138406\"\/><\/a><\/figure>\n\n\n\n<p>People in our modern world produce an incredible amount of data daily; paying attention to your security and privacy has never been more critical.&nbsp;<\/p>\n\n\n\n<p>Mobile device security is important for a host of reasons. For one, it protects sensitive business information from prying eyes! Protecting client\/business information is essential to providing good services if you&#8217;re working in sectors like finance or law.&nbsp;<\/p>\n\n\n\n<p>But regardless of industry, protecting your data is a must, especially if you\u2019re connected to an extensive corporate network. Being connected to large networks on your mobile device makes it easier for malicious individuals to target mobile devices to breach security.&nbsp;<\/p>\n\n\n\n<p>And if you\u2019ve ever worked in a large organization, you\u2019d know how devastating the effects of even just an hour of system downtime can be\u2014not to mention the actual ramifications of tampered data.&nbsp;<\/p>\n\n\n\n<p>With that, here are some ways you can improve mobile <a href=\"https:\/\/tecuy.com\/what-is-data-security-types-challenges-and-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">data security<\/a> to protect your data and privacy.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Improve_Mobile_Device_Security\"><\/span>How to Improve Mobile Device Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Develop_a_standard_cybersecurity_policy\"><\/span>1. Develop a standard cybersecurity policy<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>First on the list is developing a standard cybersecurity policy. Having specific operating standards for remote work is crucial to ensuring your company\u2019s data is safe and protected.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/xtrium.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to Finn Wheatley of Xtrium<\/a>, one of the reasons for company data risk exposure is employee error. Some employees may not set proper passwords on their devices, or they might not be using the most secure system available.&nbsp;<\/p>\n\n\n\n<p>Here are some things you can incorporate into your cybersecurity policy:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Devise a system for password strength (e.g., passwords need to have special symbols, numbers, and case-sensitive characters);<\/li>\n\n\n\n<li>Have IT support install safe tools and applications;<\/li>\n\n\n\n<li>Do not allow employees to log in to company accounts on a public network (which is far less secure than a home connection);<\/li>\n\n\n\n<li>Require employees to use a LAN or VPN instead of just WiFi when connecting to company services;<\/li>\n\n\n\n<li>Have an excellent onboarding and offboarding program that will allow smooth installation and removal of sensitive company information on employee devices;<\/li>\n\n\n\n<li>Only use company-vetted devices (no personal devices for work);<\/li>\n<\/ul>\n\n\n\n<p>This list is just a way to start you off; there are plenty of other ways you can properly incorporate cybersecurity for your remote-first company.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Train_employees_on_mobile_device_security\"><\/span>2. Train employees on mobile device security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In line with #1, it is essential to provide employee security training. Although most people today are technologically-savvy, there is a significant difference between knowing technology on a user level, and utilizing it on a corporate scale.&nbsp;<\/p>\n\n\n\n<p>Thus, make sure to invest time and effort into ensuring all employees and contractors connected to your network are well-versed in company protocols when it comes to cybersecurity.&nbsp;<\/p>\n\n\n\n<p>You can do this as part of the onboarding process or conduct regular training sessions to keep the entire organization up to speed.&nbsp;<\/p>\n\n\n\n<p>While training alone is not likely to deter security breaches from happening, it will definitely help <a href=\"https:\/\/virtalent.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">virtual assistants<\/a> and  remote employees be more vigilant around company data and devices.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Use_secure_network_connections\"><\/span>3. Use secure network connections<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Network security is one of the most important things you must pay attention to when securing your mobile devices. When working remotely, it can be tempting to work in a cafe or a <a href=\"https:\/\/www.spacebring.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">co-working space<\/a>\u2014especially if you\u2019ve been cooped up at home for way too long.\u00a0<\/p>\n\n\n\n<p>But public WiFi connections are a security nightmare if you\u2019re dealing with sensitive information. Even your home Internet connection may not be as secure as it should be, although using a LAN will reduce the risk of security breaches.&nbsp;<\/p>\n\n\n\n<p>The best course of action would be to use a <a href=\"https:\/\/vpncentral.com\/can-vpn-hack-your-phone\/\" target=\"_blank\" rel=\"noreferrer noopener\">secure VPN<\/a> so that employees can connect to the company network safely. Employers should utilize the <a href=\"https:\/\/www.vpnbrains.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">best VPN<\/a> available to protect their information.<br><br>You can also take additional steps to secure your personal devices, such as using a <a href=\"https:\/\/www.callersmart.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">reverse phone lookup service<\/a> to verify unknown calls and texts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Keep_an_eye_on_your_mobile_devices\"><\/span>4. Keep an eye on your mobile devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It might seem like a no-brainer to pay close attention to your laptop or work phone, but you\u2019d be surprised by how many people are very nonchalant about where they leave their belongings.&nbsp;<\/p>\n\n\n\n<p>If you do leave home with your laptop, such as when you are going to work out of town or bringing your work to vacation digital nomad style, there are countless opportunities for your laptop to get stolen or tampered with. For starters, never leave your laptop:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unattended in a cafe or co-working space;<\/li>\n\n\n\n<li>In your hotel room when you aren\u2019t present;<\/li>\n\n\n\n<li>In your checked-in luggage;<\/li>\n\n\n\n<li>Unattended in a vehicle;<\/li>\n<\/ul>\n\n\n\n<p>And the list goes on. The bottom line is that wherever you are going, make sure you are not leaving your laptop or phone behind for any possibility of theft (which might be more of a risk in some regions of the globe than in others).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Encourage_the_use_of_password_managers\"><\/span>5. Encourage the use of password managers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Around <a href=\"https:\/\/www.enzoic.com\/blog\/8-stats-on-password-reuse\/\" target=\"_blank\" rel=\"noreferrer noopener\">73% of users<\/a> use duplicate passwords for their personal and work accounts. As you can imagine, this creates more than undesirable security issues for your company, even if you practice changing passwords after a given period.&nbsp;<\/p>\n\n\n\n<p>One of the main reasons why users aren\u2019t fond of changing their passwords is forgetfulness. Everybody likes convenience, and there\u2019s nothing more convenient than having one password for all accounts (no matter how much of a security nightmare it might sound like).&nbsp;<\/p>\n\n\n\n<p>Password managers are an excellent way to circumvent this issue as they encourage the use of varying passwords for each account, all stored and encrypted safely so that the user can easily reach them if needed.&nbsp;<\/p>\n\n\n\n<p>Here are some password managers to get you started:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bitwarden<\/li>\n\n\n\n<li>Dashlane<\/li>\n\n\n\n<li>Keeper<\/li>\n\n\n\n<li>LastPass<\/li>\n<\/ul>\n\n\n\n<p>Each of these has its own pros and cons, so do your research on which one is the best for your needs and budget. On top of that, don\u2019t forget to encourage employees to use strong passwords and have a robust policy in place for regularly updating passwords.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Use_2-factor_authentication\"><\/span>6. Use 2-factor authentication<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In some instances, passwords just aren\u2019t enough. Adding another level of security through the use of 2FA is a great step towards improved IT infrastructure\u2014especially as methods to breach security continue to evolve.&nbsp;<\/p>\n\n\n\n<p>2-factor authentication allows your users to log in to company services more securely, even in a remote setting.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Utilize_encryption_software\"><\/span>7. Utilize encryption software<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Another way to improve mobile security in the age of remote work is through the use of encryption software. Encryption exists in many ways\u2014two of our prior suggestions (VPNs and Password Managers) utilize encryption to keep your data safe.&nbsp;<\/p>\n\n\n\n<p>But one of the more obvious ways to use encryption software is by encrypting documents and keeping them password protected. You can use tools like <a href=\"https:\/\/www.kdan.com\/en\/pdf-reader\/how-to-encrypt-a-pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a> encryptors to help keep any corporate records secure and away from prying eyes.&nbsp;<\/p>\n\n\n\n<div id=\"cta-block_568c5059ffbcbd6cc422ec486f03036c\" class=\"cta-container theme-pdf\">\n    <div class=\"cta-left-wrapper\">\n        <h3 class=\"cta-title\"><span class=\"ez-toc-section\" id=\"PDF_Reader\"><\/span>PDF Reader <span class=\"ez-toc-section-end\"><\/span><\/h3>\n        <ul>\n          <li>Empower your mobile workforce <\/li>\n          <li>Edit, convert, and read PDF documents<\/li>\n          <li>Available on iOS, Android, Mac, and Windows <\/li>\n        <\/ul>\n    <\/div>\n    <div class=\"cta-right-wrapper\">\n       <p class=\"cta-tips\">Enhance your productivity now!<\/p>\n       <a class=\"cta-link\" href=\"https:\/\/www.kdan.com\/en\/pdf-reader\" target=\"_blank\">Download<\/a>\n    <\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Keep_your_systems_updated\"><\/span>8. Keep your systems updated<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A huge part of why you want to keep your devices updated is because of the security benefits that come with the updates. Making sure your systems are always up-to-date ensures you are always getting the best available base-level security for your device.&nbsp;<\/p>\n\n\n\n<p>It might be more convenient to click on \u201cUpdate later\u201d now, but <a href=\"https:\/\/cleanmymac.com\/blog\/cant-update-mac\" target=\"_blank\" rel=\"noreferrer noopener\">not updating<\/a> your applications and systems to their latest versions can actually make your device more vulnerable to security issues.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Properly_dispose_of_hardware\"><\/span>9. Properly dispose of hardware<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Last but certainly not least is the proper disposal of hardware. Mobile device security and privacy don\u2019t just matter when an employee is working; it is also just as relevant after offboarding.&nbsp;<\/p>\n\n\n\n<p>An offboarding process that properly facilitates the removal of company data from mobile devices is imperative to a secure WFH framework. In the instances when the company owns the devices and employees have to give them back, make sure there is proper protocol in place for the return (i.e., the company sends a shipping label with instructions).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Mobile device security isn\u2019t a pretty topic, but it is essential to keep your business running well, especially if you are a remote-first company.&nbsp;<\/p>\n\n\n\n<p>Given the collective mindset changes worldwide, it isn\u2019t unreasonable to think that remote work is here to stay. If you leverage remote work properly and have a robust <strong>privacy<\/strong>, <strong>cyber<\/strong>,<strong> and <a href=\"https:\/\/www.pelco.com\/blog\/physical-security-guide\" target=\"_blank\" rel=\"noreferrer noopener\">physical security<\/a><\/strong> policy in place, you might even onboard more top talent than you expected!&nbsp;<\/p>\n\n\n\n<p>And if you\u2019re a freelancer concerned about security, these suggestions should also apply to you\u2014albeit on a smaller scale.<br><br><br><strong>Author bio:<\/strong><br><br><em>Roy Emmerson is the co-founder of TechTimes.com, a B2B SaaS platform that helps businesses stay up-to-date on the latest technology trends. With over a decade of experience in the tech industry, Roy is a thought leader in the field and is passionate about helping companies embrace new technologies to improve their operations and drive growth.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-thumbnail\"><a href=\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/1567451517257-2.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/1567451517257-2.jpg?resize=150%2C150&#038;ssl=1\" alt=\"Co-founder of TechTimes.com - Roy Emmerson\" class=\"wp-image-142829\" srcset=\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/1567451517257-2.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/1567451517257-2.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/1567451517257-2.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 150px) 85vw, 150px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Around 59% of US workers who can do their jobs from home report that they usually utilize a work-from-home setup nearly all the time. While remote work is not as prevalent now as it was at the height of the COVID-19 pandemic, it is still much higher than before the lockdown.&nbsp;<\/p>\n","protected":false},"author":5,"featured_media":138372,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204],"tags":[873,166],"class_list":["post-137237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-mobile-security","tag-pdf-reader"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work<\/title>\n<meta name=\"description\" content=\"Security in the modern age is a challenge. Here are 9 different ways to improve mobile device security and privacy for remote teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kdan.com\/blog\/mobile-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work\" \/>\n<meta property=\"og:description\" content=\"Security in the modern age is a challenge. Here are 9 different ways to improve mobile device security and privacy for remote teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kdan.com\/blog\/mobile-security\" \/>\n<meta property=\"og:site_name\" content=\"KDAN Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-04T05:53:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-29T07:00:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KDAN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"KDAN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security\"},\"author\":{\"name\":\"KDAN\",\"@id\":\"https:\/\/www.kdan.com\/blog\/#\/schema\/person\/85f76b50cc938aac5dddc53e04c73bb6\"},\"headline\":\"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work\",\"datePublished\":\"2023-05-04T05:53:14+00:00\",\"dateModified\":\"2024-11-29T07:00:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security\"},\"wordCount\":1766,\"publisher\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1\",\"keywords\":[\"Mobile Security\",\"PDF Reader\"],\"articleSection\":[\"Business\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security\",\"url\":\"https:\/\/www.kdan.com\/blog\/mobile-security\",\"name\":\"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work\",\"isPartOf\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1\",\"datePublished\":\"2023-05-04T05:53:14+00:00\",\"dateModified\":\"2024-11-29T07:00:04+00:00\",\"description\":\"Security in the modern age is a challenge. Here are 9 different ways to improve mobile device security and privacy for remote teams.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kdan.com\/blog\/mobile-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1\",\"width\":2560,\"height\":1707,\"caption\":\"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kdan.com\/blog\/mobile-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kdan.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business\",\"item\":\"https:\/\/www.kdan.com\/blog\/category\/business\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kdan.com\/blog\/#website\",\"url\":\"https:\/\/www.kdan.com\/blog\/\",\"name\":\"KDAN Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kdan.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kdan.com\/blog\/#organization\",\"name\":\"KDAN Blog\",\"url\":\"https:\/\/www.kdan.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kdan.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2024\/06\/KDAN_blog_c%C2%B6%C2%B2a%C2%9D%C2%80c%C2%B8%C2%AEa%C2%9C%C2%96_512x512.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2024\/06\/KDAN_blog_c%C2%B6%C2%B2a%C2%9D%C2%80c%C2%B8%C2%AEa%C2%9C%C2%96_512x512.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"KDAN Blog\"},\"image\":{\"@id\":\"https:\/\/www.kdan.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/kdan-mobile-software-ltd-\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kdan.com\/blog\/#\/schema\/person\/85f76b50cc938aac5dddc53e04c73bb6\",\"name\":\"KDAN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kdan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f9fe9ded67059720e4626bd24353d7b73339543d2906ae59f6dcd6d82254124f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f9fe9ded67059720e4626bd24353d7b73339543d2906ae59f6dcd6d82254124f?s=96&d=mm&r=g\",\"caption\":\"KDAN\"},\"url\":\"https:\/\/www.kdan.com\/blog\/author\/kdanmobile\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work","description":"Security in the modern age is a challenge. Here are 9 different ways to improve mobile device security and privacy for remote teams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kdan.com\/blog\/mobile-security","og_locale":"en_US","og_type":"article","og_title":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work","og_description":"Security in the modern age is a challenge. Here are 9 different ways to improve mobile device security and privacy for remote teams.","og_url":"https:\/\/www.kdan.com\/blog\/mobile-security","og_site_name":"KDAN Blog","article_published_time":"2023-05-04T05:53:14+00:00","article_modified_time":"2024-11-29T07:00:04+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg","type":"image\/jpeg"}],"author":"KDAN","twitter_misc":{"Written by":"KDAN","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kdan.com\/blog\/mobile-security#article","isPartOf":{"@id":"https:\/\/www.kdan.com\/blog\/mobile-security"},"author":{"name":"KDAN","@id":"https:\/\/www.kdan.com\/blog\/#\/schema\/person\/85f76b50cc938aac5dddc53e04c73bb6"},"headline":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work","datePublished":"2023-05-04T05:53:14+00:00","dateModified":"2024-11-29T07:00:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kdan.com\/blog\/mobile-security"},"wordCount":1766,"publisher":{"@id":"https:\/\/www.kdan.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1","keywords":["Mobile Security","PDF Reader"],"articleSection":["Business"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kdan.com\/blog\/mobile-security","url":"https:\/\/www.kdan.com\/blog\/mobile-security","name":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work","isPartOf":{"@id":"https:\/\/www.kdan.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage"},"image":{"@id":"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1","datePublished":"2023-05-04T05:53:14+00:00","dateModified":"2024-11-29T07:00:04+00:00","description":"Security in the modern age is a challenge. Here are 9 different ways to improve mobile device security and privacy for remote teams.","breadcrumb":{"@id":"https:\/\/www.kdan.com\/blog\/mobile-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kdan.com\/blog\/mobile-security"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kdan.com\/blog\/mobile-security#primaryimage","url":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1","width":2560,"height":1707,"caption":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work"},{"@type":"BreadcrumbList","@id":"https:\/\/www.kdan.com\/blog\/mobile-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kdan.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business","item":"https:\/\/www.kdan.com\/blog\/category\/business"},{"@type":"ListItem","position":3,"name":"9 Ways to Improve Mobile Security and Privacy in the Age of Remote Work"}]},{"@type":"WebSite","@id":"https:\/\/www.kdan.com\/blog\/#website","url":"https:\/\/www.kdan.com\/blog\/","name":"KDAN Blog","description":"","publisher":{"@id":"https:\/\/www.kdan.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kdan.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kdan.com\/blog\/#organization","name":"KDAN Blog","url":"https:\/\/www.kdan.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kdan.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2024\/06\/KDAN_blog_c%C2%B6%C2%B2a%C2%9D%C2%80c%C2%B8%C2%AEa%C2%9C%C2%96_512x512.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2024\/06\/KDAN_blog_c%C2%B6%C2%B2a%C2%9D%C2%80c%C2%B8%C2%AEa%C2%9C%C2%96_512x512.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"KDAN Blog"},"image":{"@id":"https:\/\/www.kdan.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kdan-mobile-software-ltd-\/"]},{"@type":"Person","@id":"https:\/\/www.kdan.com\/blog\/#\/schema\/person\/85f76b50cc938aac5dddc53e04c73bb6","name":"KDAN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kdan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f9fe9ded67059720e4626bd24353d7b73339543d2906ae59f6dcd6d82254124f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f9fe9ded67059720e4626bd24353d7b73339543d2906ae59f6dcd6d82254124f?s=96&d=mm&r=g","caption":"KDAN"},"url":"https:\/\/www.kdan.com\/blog\/author\/kdanmobile"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/05\/close-up-smartphone-with-mock-up-scaled.jpg?fit=2560%2C1707&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pgBSiO-zHv","jetpack-related-posts":[{"id":745897,"url":"https:\/\/www.kdan.com\/blog\/the-key-benefits-of-the-digital-workplace","url_meta":{"origin":137237,"position":0},"title":"Unlocking Efficiency and Innovation: The Key Benefits of the Digital Workplace","author":"KDAN","date":"October 29, 2023","format":false,"excerpt":"Today\u2019s business landscape is evolving quickly and the digital workplace has emerged as an important strategy for teams striving to stay competitive. With technology continuing to advance at breakneck speed, organizations are recognizing the need to embrace digital transformation for long-term success.\u00a0 Read on for a closer look at the\u2026","rel":"","context":"In &quot;About KDAN&quot;","block_context":{"text":"About KDAN","link":"https:\/\/www.kdan.com\/blog\/category\/about-kdan"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/10\/Digital_Workplace_Trends_1080x608.png?fit=1080%2C608&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/10\/Digital_Workplace_Trends_1080x608.png?fit=1080%2C608&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/10\/Digital_Workplace_Trends_1080x608.png?fit=1080%2C608&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/10\/Digital_Workplace_Trends_1080x608.png?fit=1080%2C608&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2023\/10\/Digital_Workplace_Trends_1080x608.png?fit=1080%2C608&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5631,"url":"https:\/\/www.kdan.com\/blog\/future-of-work-is-mobile","url_meta":{"origin":137237,"position":1},"title":"The Future of Work is Mobile &#8211; Here\u2019s Why","author":"KDAN","date":"June 29, 2022","format":false,"excerpt":"During the post-pandemic phase, companies need to reconsider their working form, relatively, recruitment problem. May remote work becomes the new norm or not? Must we embrace a mobile mindset? Read more to find your answer.","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/www.kdan.com\/blog\/category\/business"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2019\/06\/pexels-photo-1471752.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2019\/06\/pexels-photo-1471752.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2019\/06\/pexels-photo-1471752.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2019\/06\/pexels-photo-1471752.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2019\/06\/pexels-photo-1471752.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6385,"url":"https:\/\/www.kdan.com\/blog\/work-from-home-common-challenges","url_meta":{"origin":137237,"position":2},"title":"Working from Home: 5 Common Challenges and How to Tackle Them","author":"KDAN","date":"May 8, 2020","format":false,"excerpt":"The work-from-home trend has been catching on in recent weeks. Yet even before COVID-19 became a factor, an increasing number of people have been saying goodbye to their onerous commute to work. Employees of Kdan Mobile have been executing work-from-home (WFH) policies for years while managing a global team. We\u2019ve\u2026","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/www.kdan.com\/blog\/category\/business"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2020\/05\/feature_image.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2020\/05\/feature_image.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2020\/05\/feature_image.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2020\/05\/feature_image.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2020\/05\/feature_image.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":10026,"url":"https:\/\/www.kdan.com\/blog\/microsoft-teams-esign","url_meta":{"origin":137237,"position":3},"title":"Kdan Mobile Begins Collaboration With Microsoft, Integrates DottedSign With Microsoft Teams","author":"KDAN","date":"July 20, 2022","format":false,"excerpt":"Kdan Mobile Software Ltd., an international SaaS company, announced a series of upcoming collaboration projects with Microsoft. Kdan\u2019s e-signature platform, DottedSign, now integrates with Microsoft Teams. Future efforts will continue to make Kdan\u2019s software solutions available for users of Microsoft\u2019s platforms.","rel":"","context":"In &quot;About KDAN&quot;","block_context":{"text":"About KDAN","link":"https:\/\/www.kdan.com\/blog\/category\/about-kdan"},"img":{"alt_text":"KDAN MOBILE BEGINS COLLABORATION WITH MICROSOFT, INTEGRATES DOTTEDSIGN WITH MICROSOFT TEAMS","src":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/07\/KDAN-MOBILE-BEGINS-COLLABORATION-WITH-MICROSOFT-INTEGRATES-DOTTEDSIGN-WITH-MICROSOFT-TEAMS-1.png?fit=1200%2C661&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/07\/KDAN-MOBILE-BEGINS-COLLABORATION-WITH-MICROSOFT-INTEGRATES-DOTTEDSIGN-WITH-MICROSOFT-TEAMS-1.png?fit=1200%2C661&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/07\/KDAN-MOBILE-BEGINS-COLLABORATION-WITH-MICROSOFT-INTEGRATES-DOTTEDSIGN-WITH-MICROSOFT-TEAMS-1.png?fit=1200%2C661&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/07\/KDAN-MOBILE-BEGINS-COLLABORATION-WITH-MICROSOFT-INTEGRATES-DOTTEDSIGN-WITH-MICROSOFT-TEAMS-1.png?fit=1200%2C661&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/07\/KDAN-MOBILE-BEGINS-COLLABORATION-WITH-MICROSOFT-INTEGRATES-DOTTEDSIGN-WITH-MICROSOFT-TEAMS-1.png?fit=1200%2C661&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":8738,"url":"https:\/\/www.kdan.com\/blog\/types-of-remote-editing-jobs","url_meta":{"origin":137237,"position":4},"title":"Types Of Remote Editing Jobs And How To Find One","author":"KDAN","date":"September 22, 2021","format":false,"excerpt":"Read on to learn the different types of remote editing jobs, as well as provide some resources for finding remote jobs in the industry.","rel":"","context":"In &quot;Creative&quot;","block_context":{"text":"Creative","link":"https:\/\/www.kdan.com\/blog\/category\/creative"},"img":{"alt_text":"image of working anywhere","src":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2021\/09\/kevin-bhagat-zNRITe8NPqY-unsplash.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2021\/09\/kevin-bhagat-zNRITe8NPqY-unsplash.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2021\/09\/kevin-bhagat-zNRITe8NPqY-unsplash.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2021\/09\/kevin-bhagat-zNRITe8NPqY-unsplash.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2021\/09\/kevin-bhagat-zNRITe8NPqY-unsplash.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":9770,"url":"https:\/\/www.kdan.com\/blog\/sustainable-design-kdan-mobiles-product-philosophy","url_meta":{"origin":137237,"position":5},"title":"Sustainable Design: Kdan Mobile\u2019s Product Philosophy","author":"KDAN","date":"June 6, 2022","format":false,"excerpt":"The future of environmental protection is digital-first, which is why Kdan\u2019s product philosophy revolves around digital solutions such as Document 365, Creativity 365, and DottedSign that are designed to promote sustainable lifestyles and businesses.","rel":"","context":"In &quot;Sustainability&quot;","block_context":{"text":"Sustainability","link":"https:\/\/www.kdan.com\/blog\/category\/sustainability"},"img":{"alt_text":"Sustainability Design at Kdan Mobile","src":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/06\/sustainability-design-kdan-mobile-min.jpg?fit=1080%2C608&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/06\/sustainability-design-kdan-mobile-min.jpg?fit=1080%2C608&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/06\/sustainability-design-kdan-mobile-min.jpg?fit=1080%2C608&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/06\/sustainability-design-kdan-mobile-min.jpg?fit=1080%2C608&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.kdan.com\/blog\/wp-content\/uploads\/2022\/06\/sustainability-design-kdan-mobile-min.jpg?fit=1080%2C608&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/posts\/137237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/comments?post=137237"}],"version-history":[{"count":18,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/posts\/137237\/revisions"}],"predecessor-version":[{"id":1910232,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/posts\/137237\/revisions\/1910232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/media\/138372"}],"wp:attachment":[{"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/media?parent=137237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/categories?post=137237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kdan.com\/blog\/wp-json\/wp\/v2\/tags?post=137237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}