Posts Tagged ‘mobile technology’

h1

Majority mobile device users do not use security measures

March 12, 2012

96 percent of business professionals surveyed use mobile devices to store, access and send sensitive material, and the majority are doing so without e-mail encryption or metadata removal, thus posing significant security risks. Over a third acknowledged the high risk of sensitive information leaking via document metadata.

Read More

Advertisements
h1

Cyber experts show vulnerability of GSM networks

February 21, 2012

A group of cyber experts stunned a conference here when they showed the vulnerability of GSM mobile networks which can be easily exploited by hackers enabling them to impersonate a user’s identity and make calls from his account without a clue to the consumer.

The ethical group — matrix shell — gave a demonstration of the hacker’s technique on a live network of a leading mobile service provider in which they managed to make a call using the number of a audience member without actually using his phone or SIM.

h1

Enterprise Application Storefront

February 18, 2012

Enterprise mobile devices and applications must be secured and managed.  A secure enterprise application storefront is the key.

1. Decide on mobile applications and update as needed

2. Secure all devices

3. Block the users from downloading applications if not secure or approved.  

IT needs to be able to authenticate the device and the user. IT must also know the state of the device’s security. Is it running a recent OS or an older one. Does it have encryption? Has it been compromised?

Any mobile application that is not tied to mobile device management and enterprise security is insecure.

h1

IBM 2011 Tech Trends Report: Mobile

November 21, 2011
h1

Study: IT’s Future Lies With Cloud Computing, Security and Mobile

November 7, 2011

Cloud computing, security and the mobile space hold the most growth potential in the coming years, according to IT professionals surveyed by tech staffing firm Modis.

While no single technology dominated that portion of the study, which polled 502 tech workers on issues related to their jobs and the IT industry, those areas took the top three spots. Cloud computing earned 29 percent of the vote, security tallied 21 percent and mobile scored 18 percent.

The technologies are linked, said Jack Cullen, president of Modis. As companies turn to cloud computing to deliver services over mobile devices, securing data is paramount, he said.

“Security has got to be one of the first things you think about even before talking about mobile applications or strategy,” he said. Firms first need to ask how they plan on securing their information in a cloud computing environment.

 Source:  Study: IT’s Future Lies With Cloud Computing, Security and Mobile

 

 

h1

Privacy is consumers’ top mobile app concern: survey

April 28, 2011

Privacy is consumers’ top concern when using mobile applications, according to a survey by online security firm TRUSTe released April 27. Nearly four in 10 consumers (38%) identified privacy as their top concern, and more than half (56%) said the issue is one of their foremost concerns, according to the online survey of 1,000 consumers conducted in February by research company Harris Interactive.

Privacy is an important issue for consumers because of the personal information that mobile devices hold, such as contact lists and emails, said Fran Maier, president and executive chair of the board at TRUSTe. She added that 85% of consumers restrict the information they share through their mobile phones, with “more than half” unwilling to share their location, address, date of birth, phone number and browsing history.

More than half (52%) of consumers said they have read an app’s privacy policy, according to the study. Nearly three in four consumers (74%) expressed dislike of advertiser tracking, and 85% said they want the ability to opt-in and opt-out of targeted mobile ads.

Source Privacy is consumers’ top mobile app concern: survey

Visit us at http://www.gosecure.com soon