It used to happen all the time. People actually carried a work phone and a personal phone. There used to be a real cost to how companies and their employees used their digital devices. Now, with inexpensive and unlimited use cellular plans, the financial concerns of using a personal device for work have gone by … Read More
If you think about it, practically every type of security product in the market provides security through surveillance. Surveillance is the act of keeping a close watch over someone or something in order to prevent or detect. In law enforcement it’s looking for crime but in an IT sense it’s monitoring for cyber activity. Either … Read More
Criminals may not have physical access to your device – but that won’t stop them from hacking your device remotely to steal sensitive and confidential data. The BYOD revolution is here to stay and enterprises need to adopt mobile security best practices that can help prevent cyberattacks like Shellshock, WireLurker, and now DoubleDirect. iOS and … Read More
Why $250 million didn’t protect JPMorgan from hackers… Late last month CBS Nightly News reported about a robbery at American’s biggest bank, JPMorgan. This attack was no ordinary hold-up. JP Morgan Chase fell victim to a targeted cyberattack, despite spending $250 million dollars on cybersecurity. According to the information disclosed by sources to CBS, the … Read More
In our previous blog post, we wrote about what’s planned for 2014. Since we’re aiming to change the world of mobile security, maybe a good place to start is to describe the security limitations on smart devices. Like a computer, right? Often, people think that mobile device security is exactly like PC security. Oh boy, … Read More