Data Security For Smartphones: 5 Ways to Protect Your Company Data

Data Security For Smartphones: 5 Ways to Protect Your Company Data

Attackers don’t care whether a mobile phone is privately owned or company property. All they want is the data. Every day, cyber criminals sneak in through unlocked doors and security gaps – and steal company data from mobile devices. Germany’s digital association...
Phishing Enters Mobile-first Waters

Phishing Enters Mobile-first Waters

In November 2018, football fans across Europe were rocked by the news of an offer, made to FIFA, to invest $25 billion in an expanded version of the World Cup. The media also brought reports that Gianni Infantino, president of FIFA, had allegedly breached compliance...
Mobile Device Management or Container Apps? Make the Right Choice

Mobile Device Management or Container Apps? Make the Right Choice

Mobile security is a huge challenge for IT departments. Two different approaches can be taken: one uses mobile device management and focuses on the device itself; the other deploys user-friendly container apps and focuses on data. Both have advantages. But which...
X