64 Percent of Security Pros Can’t Stop a Mobile Data Breach

Sixty-four percent of security professionals doubt their organizations can prevent a breach to employees’ mobile devices, a recent Dimensional Research survey of 410 security leaders found. The survey, sponsored by Check Point Software, also found that 20 percent of businesses have experienced a mobile breach, and another 24 percent don’t know, or can’t tell, whether they’ve […]

Businesses must take responsibility for mobile security, when users fail

Mobile users frequently stray from official app stores when looking for new mobile applications, putting themselves under increased risk from malware, ransomware and other malicious actors. This is according to a new report by RiskIQ, which says that users in the UK are a bit more ‘conservative’, and a bit more on the safe side, […]

Want to blame someone for a data breach? Blame mobile workers

Almost a third of companies have suffered either data loss or a security breach because their employees use mobile technologies to work. This is according to a new report by Apricorn. The company polled 100 IT decision makers in the UK for the report. Read the new report by Apricorn which reveals that nearly half (44 […]

A Growing Talent Shortfall Can Leave Apps Vulnerable

Read why John Matthew Holt says that cyber security skill shortage can leave mobile apps vulnerable to cyber criminals on Infosec Magazine : It has recently been widely reported that there is a growing talent shortfall of security professionals, which is expected to reach 1.5 million by 2020. This will prove to be an unlikely […]

Mobile working a major cause of data breaches (Infographic)

New research has highlighted how organisations are failing to protect data properly, especially when utilising mobile working. The study, conducted by Vanson Bourne and commissioned by hardware-encrypted USB drive specialist Apricorn, found that 29% of surveyed organisations have already experienced either a data loss or breach as a direct result of mobile working. Read/see the infographic […]

Mobile security: The reality of malware … augmented

Read Denise Giusto Bilić’s article about the reality of mobile security and how malware affects cyber security on We Live Security : Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear today that our smartphones and tablets have evolved beyond this point, […]

Only 30% Of Subscribers Are Aware Of Risks Posed By Mobile Network Vulnerabilities

Research commissioned by Xura, Inc., a leading provider of secure, digital communications services, has revealed the extent to which mobile subscribers are unaware of vulnerabilities in their mobile operator’s network that could lead to their calls or texts being intercepted, so becoming victims of fraud or unauthorised location tracking. Read about the new survey by Xura […]

Secure Your Phone Today Or Face A Data Breach Tomorrow

Read why it is important to keep your phone secure or risk a data breach on Above The Law : According to the ABA’s 2015 Legal Technology Survey Report, nearly 40 percent of lawyers in the U.S. use public Wi-Fi to access client data, but only 22 percent are using an encrypted connection. Clearly, mobile […]

Six must-haves for IT’s mobile security checklist

Let’s face it — there is no such thing as absolute security, and there likely never will be, simply because allowing even restricted access to any resource means that someone might compromise this access. Read about the mobile security checklist that every company must have to protect it assets against cyber attacks on Tech Target. […]

Mobile Device Security is the need of the hour

Read why Ankush Tiwari says that mobile device security is the need of the hour on CIO Insight : With the phenomenal increase in the number of Smartphone across the emerging market, Data security & manageability at your workplace have increased enterprise demand for customized and specialized device features that go far above and beyond […]