search

Data silos and security risks from unauthorised apps

In many businesses, there’s little visibility into the unauthorised apps employees download and use to get their work done and it’s becoming a major threat to business security. Employees circumvent using the company-approved tools that they find frustrating or outdated to help them work faster and more efficient and avoid switching between a large number of authorised apps.

Topics: Security

imei@FCON-Tech25: Fast and reliable business connectivity solutions for the construction industry

As artificial intelligence becomes indispensable to the construction industry, fast and reliable mobile networks become more important than ever. Whether it’s using artificial intelligence to simplify contract management, automate reporting, or predict risks, these mission critical applications rely on fast 5G connectivity. Likewise, when using AI to improve safety and reduce waste, for real-time tracking of people and equipment across multiple construction sites, business connectivity is everything.

Topics: Security Management Unified Communications Connectivity IoT

Mobile threat management critical to boosting cyber security defences

From the prospect of drying up the beer supply in Japan, to crippling prestige car production in the UK, and wreaking havoc with millions of customer records in Australia: the increased scale and sophistication of cyber-attacks around the world puts a new focus on mobile threat detection and device security.

Topics: Security

Three ways to beat mobile device security risk

In modern business environments, from corporate offices to healthcare settings, manufacturing plants, retail stores, mines, and construction sites, mobile devices are the workplace tool of choice. In tandem, a surge in cyber threats, including ransomware, phishing, and malware, are always at the ready to exploit device vulnerabilities, making mobile device security best practices more important than ever.

Topics: Security

Mobile data security reboot for increasing AI-driven threats

In the realm of mobile data security in our AI-enabled world, it’s critical to keep up to date with best practices for securing data in AI systems. It should come as no surprise to learn that this encompasses all the usual suspects, from data encryption to digital signatures, data provenance tracking, secure storage, and trusted infrastructure.

Topics: Security