mobile security

It’s Better To Bring Messaging Apps Out Of The Shadows

Organizations are implementing stricter mandates for what kind of platforms and mobile features employees can use on both personal and corporate-owned devices, prompting a dramatic increase in the rise of "shadow IT" like unauthorized messaging apps. By bringing messaging apps out of the shadows and into the mainstream, organizations can reduce the risk of both outside and inside threats to the enterprise.

The Connected Car: Safety, Security and Convenience

Connected car technology has been around at least since the mid-1990s, when GM’s OnStar system debuted in 1996. Today, most people think of the connected car as one that is connected to the Internet or some external service for information and entertainment, navigation, and, increasingly, safety. What does this connectivity do to the way we use these vehicles - what is its impact on our our security, our safety?

How To Stay Cybersecure This Summer Vacation

Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.

If We Simplify IT Security, Maybe People Will Use It

The growing complexity of the cybersecurity industry is undeniable. Through personal examples, Expert Javvad Malik explains why complex problems don't always require complex solutions, pointing to examples such as hybrid cars, which are extremely complex technically, but seamless to use for a consumer.

The Perpetual Tug-of-War Between Security and Convenience. What to Do?

Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?

The Security Risks of Lost and Stolen Devices

Despite an increasing number of organizations are choosing to embrace the bring your own device (BYOD) trend, there are still considerable security risks involved that many are not aware of. This article will explain what are the possible security risks involved with BYOD and how to prevent them.

Data Breaches Happen to SMBs Too. Often Because of Human Error

Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.

Cybercriminals Love Your Mobile Profile And Everything You Do

Communication service providers can protect consumers and their businesses by offering value-added security services can help combat malware threats for users.

Buckle Up! 2017 Is Gonna Get Bumpy. 10 CyberSecurity Predictions

As 2016 comes to close, we are faced with many questions about what to expect in the coming year. Will malware ridden homes become the norm? Will mobile payments continue to mature and find their place in major organizations? Will we see physical injuries as a result of digital attacks? Mandeep Khera of Arxan shares his predictions with ITSPmagazine.

Legacy Tech: Someone or Something Might Be Lurking in The Shadow

Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.

Cybersecurity? There's No Accounting for Human Weakness

Cybersecurity only works if you actually implement it – otherwise, it’s like having a state-of-the art alarm system on your house but then leaving the bedroom window open for fresh air. Unfortunately, the weakest link in the security chain comes down to the end users.

Meeting The Mobile Enterprise Threat: Securing and Governing Sensitive Files With Mobile Devices

“Ask any IT manager, compliance officer or C-level executive what keeps them up at night, and the loss of market confidence, competitiveness and compliance resulting from a mobile data breach is near the top of the list,” said Josh Bohls, Founder, Inkscreen.