Smartphone hacking is prevalent nowadays and is a very profitable business. In fact, there are multimillion-dollar companies that purchase security vulnerabilities and sell them to other [...]
Just a few years ago, allowing mobile devices at work was optional. Businesses wrote a “bring your own device” policy, and not allowing employees to bring their own device was a reasonable [...]
Malware gets a lot of publicity, but computer viruses aren’t the main cause of security breaches. Instead, the attacks rely on stolen credentials, which are increasingly available and cheap, as [...]
When we’ve talked about the tools needed to support remote and hybrid work before, we addressed it from the perspective of the tools the remote and hybrid workers need. Those are tools for [...]
With Covid-19 restrictions came the increase in working from home. Now as those restrictions ease, many employees will continue to work from home. Mobile devices are a key element of any hybrid [...]
While users are an important element of all IT security, they’re an even larger element of security around mobile devices. Unlike almost any other IT, the mobile devices they use actually belong [...]
Mobile device management is a good first step in protecting systems against threats, but fully protecting against mobile threats means looking beyond the mobile devices themselves. Secure Mobile [...]
With more employees working remotely, ensuring security of mobile computing has become increasingly important. Verizon’s 2020 Mobile Security Index reported that well over one third—39 percent—of [...]
Businesses are increasingly reliant on mobile computing and on employees’ using their own devices for work purposes. Making sure company data remains safe when accessed through those devices is [...]
Using mobile devices for business is no longer unusual or reserved for special situations; it’s standard operating procedure. With that change in status should come a change in how you handle [...]