Earlier this month, security researchers at Promon, a Norwegian firm that specializes in in-app security, uncovered a unique vulnerability in Android devices that allows malicious apps to...
Apple in 2018, now Tesla—who’s next in the line of internal data leaks?
Recent allegations of an ex-Tesla employee syncing the Autopilot source code to his personal iCloud account is yet another classic case of how poor data security is, even in some...
Five BYOD challenges IT teams face and ways to mitigate them
BYOD stands for bring your own device, whereby your organization lets employees use personal devices for day-to-day work. Sounds simple, right? Unlike corporate devices where the enterprise has complete freedom to choose users’ device types and platforms, BYOD is...
Why now is the best time to deploy Chromebooks in your enterprise
Ever since the advent of software as a service (SaaS), the number of cloud-based solutions has been on the rise, due in part to demand...
12 mobile device features that help ensure corporate data security
Our hearts might skip a beat every time we put our hands in our pocket and can’t find our mobile phone, and we’re filled with dread at the thought of losing the device that...
More Android malware and another iOS exploit: How to safeguard your devices?
The past few months have seen both Android and iOS fall prey to various security attacks, with more malware attacks and exploits being uncovered on...
Android malware: How do enterprises tackle this ever-growing menace?
Let us first agree on a couple of things before we start: One, Android is the most affordable platform for enterprises with a mobile-first/mobile-only workforce,...
Yet another malware attack: macOS now the target for security attacks
Mac usage, as you’ve probably seen in your workplace, has risen exponentially in enterprises. According to a Jamf survey, 74 percent of those who previously used a PC...
Four simple ways to secure data in misplaced or stolen devices
In the modern era of mobility, corporate data is remotely accessed by employees around the clock through a variety of endpoints. Everything from customer data, user...