Data Security For Smartphones: 5 Ways to Protect Your Company Data

Data Security For Smartphones: 5 Ways to Protect Your Company Data

Attackers don’t care whether a mobile phone is privately owned or company property. All they want is the data. Every day, cyber criminals sneak in through unlocked doors and security gaps – and steal company data from mobile devices. Germany’s digital association...
Phishing Enters Mobile-first Waters

Phishing Enters Mobile-first Waters

In November 2018, football fans across Europe were rocked by the news of an offer, made to FIFA, to invest $25 billion in an expanded version of the World Cup. The media also brought reports that Gianni Infantino, president of FIFA, had allegedly breached compliance...
Mobile Device Management or Container Apps? Make the Right Choice

Mobile Device Management or Container Apps? Make the Right Choice

Mobile security is a huge challenge for IT departments. Two different approaches can be taken: one uses mobile device management and focuses on the device itself; the other deploys user-friendly container apps and focuses on data. Both have advantages. But which...
Hard Times for Enterprise Security: Mobile Risks Are on the Increase

Hard Times for Enterprise Security: Mobile Risks Are on the Increase

Never before has enterprise security been so volatile and under threat. Mobile devices generate new mobile risks at breakneck speed, and old threats reappear in innumerable new guises. The year 2018 was marked by an increase in mobile ransomware attacks – particularly...
X