Attackers don’t care whether a mobile phone is privately owned or company property. All they want is the data. Every day, cyber criminals sneak in through unlocked doors and security gaps – and steal company data from mobile devices. Germany’s digital association...
In November 2018, football fans across Europe were rocked by the news of an offer, made to FIFA, to invest $25 billion in an expanded version of the World Cup. The media also brought reports that Gianni Infantino, president of FIFA, had allegedly breached compliance...
Mobile security is a huge challenge for IT departments. Two different approaches can be taken: one uses mobile device management and focuses on the device itself; the other deploys user-friendly container apps and focuses on data. Both have advantages. But which...
Social engineering poses one of the greatest threats to the security of a company. This article explains what social engineering is and how it can endanger your company IT. We’ll also be looking at measures you can take to protect yourself and your employees against...
Never before has enterprise security been so volatile and under threat. Mobile devices generate new mobile risks at breakneck speed, and old threats reappear in innumerable new guises. The year 2018 was marked by an increase in mobile ransomware attacks – particularly...