With news recently that around 25 million Android phones have been infected by a new form of malware, it’s a good time to review your organisation’s mobile security deployment.
by Sid Vandervinne, on August 5, 2019
With news recently that around 25 million Android phones have been infected by a new form of malware, it’s a good time to review your organisation’s mobile security deployment.
by Sid Vandervinne, on June 19, 2019
Back in March, at Mobile World Congress in Barcelona, we heard predictions of more than 25 billion IoT connections across the globe within the next 30 years. There seems to be nothing that can't be connected to the internet. But, without robust IoT security, the enterprise will be open to new risks.
by Sid Vandervinne, on April 10, 2019
As the number of mobile cybersecurity incidents continues to increase, it’s clear many organisations are failing to protect their mobile assets, even though mobile devices are prone (and potentially more vulnerable) to many of the same attacks as other devices. In fact, mobile users are magnets for phishing attacks, malicious apps and rogue wireless hotspots.
by Sid Vandervinne, on April 3, 2019
In February, when the Office of the Australian Information Commissioner (OAIC) released its final report on Notifiable Data Breaches for 2018, it revealed a frightening sense of déjà vu. After almost a full year of reported breaches, it found enterprise data security in Australian businesses is still seriously wanting. In the last quarter of 2018, the number of data breaches suffered by Australian companies jumped 7% to 262, with malicious criminal attacks, human error, and system faults leading the way.
by Kieran Kirkpatrick, on March 11, 2019
Wasn’t it Einstein who figured insanity is doing the same thing over again, and expecting different results? For professionals tasked to secure enterprise data, it’s beyond time to start doing things differently. At a minimum, you need to bolster your cyber defences.
News recently that Australia’s political parties had been hacked by a “sophisticated state actor” should cause every business concern.
Trends and Insights for Enterprise Mobility and Unified Communications Technology.
We cover topics including mobile security, cost-effective mobile device fleet management; leveraging existing investments; secure collaboration; mobile technology for healthcare; converged communications and more.