Spring is just around the corner, and with it, not only is nature blossoming, but the work of our development teams is also bringing a breath of fresh air back into SecurePIM and the SecurePIM Management Portal. Download the latest versions of SecurePIM and the...
Attackers don’t care whether a mobile phone is privately owned or company property. All they want is the data. Every day, cyber criminals sneak in through unlocked doors and security gaps – and steal company data from mobile devices. Germany’s digital association...
In November 2018, football fans across Europe were rocked by the news of an offer, made to FIFA, to invest $25 billion in an expanded version of the World Cup. The media also brought reports that Gianni Infantino, president of FIFA, had allegedly breached compliance...
Mobile security is a huge challenge for IT departments. Two different approaches can be taken: one uses mobile device management and focuses on the device itself; the other deploys user-friendly container apps and focuses on data. Both have advantages. But which...
Social engineering poses one of the greatest threats to the security of a company. This article explains what social engineering is and how it can endanger your company IT. We’ll also be looking at measures you can take to protect yourself and your employees against...