Smartphones are indispensable in the workday of many industrial companies, but often also a cost and security risk. Small and medium-sized enterprises therefore require mobile tariffs that meet their specific needs.
Small and medium-sized industrial enterprises that use mobile tariffs with integrated security services benefit significantly.
Lukas Lebahn is Vice President Commercial Management Mobile for the business customer segment T Business at Deutsche Telekom (telecommunications company).
Whether on the way to a maintenance appointment, in the production hall, or en route to a customer, smartphones or tablets are constant companions in the work operations of many small and medium-sized enterprises in the industrial sector. Technicians use mobile devices to perform on-site fault diagnostics, order spare parts online, and document their work steps. Field service employees can access important customer and company data at any time, quickly connect with the back office, and better plan customer meetings. During quality inspections directly in the production hall, the smartphone also helps capture processes on-site and enter inspection protocols and measurement data into the system.
However, mobile flexibility also brings some security challenges, especially for small and medium-sized enterprises. Companies must not overlook the increasing security risk associated with the use of smartphones.
Phishing, Data Manipulation, or Botnet Attacks Threaten
When employees work with smartphones, there is an increased risk of becoming victims of a cyberattack. Criminals attempt to intercept sensitive data by eavesdropping or manipulating data traffic through man-in-the-middle attacks. This is especially dangerous when employees rely on unencrypted or poorly secured connections. Phishing attacks also pose a significant threat. In these attacks, employees are tricked by seemingly legitimate messages into opening malicious links or revealing confidential information. The attackers often impersonate well-known payment, postal, or logistics service providers to deceive their victims.
Another problem is the lack of awareness among employees. Many staff members are unaware of potential dangers and the correct behaviors in handling IT security. In the hustle and bustle of everyday work, employees are often less attentive, which increases the success rate of such attacks. Many studies show that human error is a common trigger for security incidents. Furthermore, there is a risk that downloading apps from unknown sources could make devices part of a botnet, which can be used for DDoS attacks (Distributed Denial of Service) or the spread of malware in the corporate network.
Medium-sized enterprises are particularly susceptible to attacks on mobile devices. According to a study by the technology group Sharp, 57 percent of SMEs lack adequate mobile security measures. This is often because these businesses cannot maintain a large-scale IT department. Large companies and corporations can ensure consistently high security levels with sophisticated mobile device management solutions (MDM). In small businesses, however, individual IT specialists or system administrators are generally already fully occupied with ongoing operations.
Security from the Mobile Network
Not only do small and medium-sized enterprises need a mobile plan that can equip as many employees as possible cost-effectively, but a plan with built-in protection can also effectively address many of the mentioned security issues. Security services integrated directly into the mobile network help minimize the administrative burden for the customer. The reality often looks like this: when mobile providers offer a security service, it consists of an additional client or app that the customer must install. Often, providers charge extra for such services.
Better are network-internal security solutions that detect and block fraudulent websites, messages, and content before sensitive data can be disclosed. This significantly reduces the risk of phishing attacks and other threats. An online portal through which customers can regularly view reports on thwarted attacks is also sensible. These reports provide valuable insights into the type and frequency of attacks and enable companies to better sensitize their employees and specifically adjust security policies. Corresponding mobile tariffs must also be suitable for multi-SIM cards and usage abroad. Only in this way can all mobile devices of a company be protected, regardless of the number of SIM cards used.
Protection Without Personnel Effort and High Costs
Mobile tariffs with built-in security features offer the significant advantage of not causing additional administrative effort for companies. The security features are already integrated into the mobile network, so companies do not have to install additional software or worry about updates.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
This simplifies cost planning and relieves the IT budget. SMEs benefit from a security service without having to bear the usually associated high costs or personnel effort. Another significant advantage is that experienced security professionals specializing in protecting business customer infrastructures oversee mobile security. They continuously analyze the threat landscape and adjust the protective measures accordingly.
Small and medium-sized industrial companies that use mobile tariffs with integrated security services can focus on their core business. Knowing they are protected from many threats in the mobile network, these companies can channel their energy into advancing digitalization and developing innovations, rather than constantly dealing with security issues.
Secure and Compliant Authentication in Laboratories