Mobile
Today, many organizations also oversee device fleets. Endpoints are growing in the enterprise and many security concerns carry over to mobile phones. Cyber Security Hub offers insight on trends in this space.
Cyber security risks lurk in popular messaging apps
December 06 by Michael HillSecurity incidents are being triggered by employees using messaging apps in business environments
IOTW: Twilio suffers data breach following phishing attack
August 11 by Olivia PowellHackers directly targeted Twilio employees with a phishing attack to gain unauthorized access to employee data
Your device’s safety in someone else’s hands: root and jailbreak
December 02 by Paweł BułatRooting and jailbreaking are used to circumnavigate limitations on Android and iOS system but these strategies can have serious affects on a device's security
Security Standards For 5G
March 23 by Esther SheinGartner predicts that the 5G enterprise IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.4 million units in 2021. By 2023, the enterprise 5...
RSAC2020: IoT Is Officially Part Of Enterprise Mobility
March 05 by Jeff OrrRisk that comes from mobile and IoT devices must be factored into the enterprise security program. Security leaders need to be looking at those risks holistically and strategically, rather than operat...
Email Phishing Overshadows Risk Of Mobile Malware
January 02 by Jeff OrrLike the mobile device’s counterpart, workstations and laptops, many loaded malware campaigns begin with phishing attempts. Cyber Security Hub developed a market report to explore the perceptions, cha...
Incident Of The Week: FaceApp Now Viral For Security Risks
July 19 by Alarice RajagopalFaceApp has become popular for its ability to take a photo of anyone’s face and age it, or transform its features. Developed by a Russian-based company, it has gone viral because many are questioning...
BYOD Rules And The Future Of Medical Data Security
April 24 by Bryan FieldingHealthcare organizations have always been extremely attractive targets to cyber criminals, so the increasing use of personal or third party mobile devices highlights a need for the implementation of m...
Incident Of The Week: Group FaceTime Glitch Exposes Privacy Breach
February 01 by Alarice RajagopalAccording to The New York Times, on Jan. 19, a 14-year-old from Arizona discovered a glitch using FaceTime, Apple’s video chatting software — he could eavesdrop on his friend’s phone before his friend...
Best Practices For Protecting Mobile Devices
January 31 by CSHub.com Editorial StaffIn the era of mobility, enterprises must be cognizant about the potential threats on the horizon. Nearly every employee has at least one mobile device that they use for work. Likewise, these devices r...
5 Reasons To Use Biometrics To Secure Mobile Devices
January 24 by CSHub.com Editorial StaffIt is no secret that mobile devices are under attack. From phishing scams to a host of other issues, mobile devices are increasingly seen as a vulnerability in the enterprise, and as an easy target fo...
7 Mobile Security Bloggers To Follow
January 15 by CSHub.com Editorial StaffWith new enterprise mobile device security threats and vulnerabilities being discovered on a frequent basis, it helps to read analysis from numerous industry leaders.