In my first blog, I discussed why mobile devices are the likely choice for savvy attackers since they typically have no endpoint protection. Let’s understand what is on the device and how that can impact an enterprise/organization. The goal of an attacker that is targeting your organization, is not to get personally identifiable information data … Read More
Posts in "Mobile Threat Defense"
According to The Wall Street Journal’s article Apple Loses Bid to End App Antitrust Case in Supreme Court, “Consumers can sue Apple Inc. for forcing them to buy apps exclusively from the tech giant, the Supreme Court ruled Monday, threatening billions of dollars in revenue that the company is counting on to make up for … Read More
Cybersecurity compromises are commonplace in the news, but rarely is it cited the compromise involved a mobile device. Attribution typically falls to vulnerabilities, social engineering, or data left in the open. With no mention of mobile devices, the perception is mobile devices are secure. In other words, there’s no smoke, so there’s no perceived fire … Read More
First in a series of four blogs on mobile device security Mobile devices – used today for everything from corporate and personal email access to tools used for company production – are very powerful computers. In fact, over the past several years, the rate of accessing the Internet via mobile devices has increased dramatically versus laptop and … Read More
The challenge with explaining something new is making that new thing relatable to something someone else already knows and understands. This is why the definition of endpoint security is so often misunderstood or mislabeled. Many compare endpoint security to antivirus protection because it is the easiest way to explain the concept. The truth is antivirus … Read More