Will your company cyber-response plan stand up to reality? Get educated on the new world of enterprise mobility.

Will your company cyber-response plan stand up to reality? Get educated on the new world of enterprise mobility.

A pwc reports that 32% of companies in their study were victims of cyber crime in 2016. It adds that most companies are still not adequately prepared for these attacks. In fact, only 37% of organisations have a cyber incident response plan.

The engagement of leadership is critical at this time of increasing cyber-crimes, but it seems that less than half of board members request information about their organisation’s state of cyber-readiness.

Will your company cyber-response plan stand up to reality? Get educated on the new world of enterprise mobility. Please call 03-22024190 or complete this form http://demo.syndes.biz/ to learn more.

[…] Read more

John Stewart, senior vice president, chief security and trust officer of Cisco once said that “Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.”

John Stewart, senior vice president, chief security and trust officer of Cisco once said that “Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.”

John Stewart, senior vice president, chief security and trust officer of Cisco once said that “Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.*quot* 

What this means for corporations is that there is no turning back this impeding future. Employees bringing their own device to work, and accessing corporate data from mobile devices will unknowingly pose threats to corporations and will have security professional searching for ways to mitigate the risks inherent in […] Read more

Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured.

Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured.

Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured. Just imagine 200,000 new malwares being found everyday! It continues to evolve to bypass most levels of IT protection, which makes it hard for most company IT infrastructures to keep up.

On top of that, most companies do not have mobile security measures in place other than the traditional office-wide IT infrastructure. This puts these companies at an even greater risk for data loss or cyber attacks.

How secure is your business? Discover the new world of enterprise mobility. Please call 03-22024190 or […] Read more

According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.

According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.

According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals. What SMiShing does is that it tricks the user into clicking on a link in a text message; and that link goes to a page prompting the user to enter personal data. The objective is to gain access to sensitive information like usernames and passwords. On top of that, many SMiShing messages will include links with malware waiting on the other side for anyone who clicks on them. 

This has implications, especially if employees are not well-informed on security threats that […] Read more

Businesses need to understand that their data is not secure when mobile devices are not managed.

Businesses need to understand that their data is not secure when mobile devices are not managed.

Businesses need to understand that their data is not secure when mobile devices are not managed. When staff use their mobile devices for work, they unintentionally compromise corporate data from email attachments and by storing documents in unsecure locations on their device. In addition, unmanaged functions such as voice recognition on devices also contribute to organizational risk by letting someone bypass the lock screen to send emails or access sensitive information.

If a business were to properly conduct an audit, the amount of data leaks will seem quite frightening, especially for larger organisations. Thankfully, mobile security solutions are quite advanced these […] Read more

The Mcaffee Mobile Threat Report 2016 shared that a company from India has released an advertising software developer kit (SDK) called SilverPush that uses the mobile phone’s microphone to listen for near-ultrasonic sounds placed in TV, radio and Web advertisements. Once SilverPush detects the signal, it collects data from the device and sends information back to the advertiser. While this is not a piece of malware, it is a huge concern from a privacy perspective. 

Imagine if the mobile devices of your employees are embedded with SIlverPush? What kind of confidential and sensitive information could your device pick up?

Is your business secure […] Read more

Global businesses have spent the last decade, and a couple of billions of dollars securing their corporate networks and making sure they are compliant.

Global businesses have spent the last decade, and a couple of billions of dollars securing their corporate networks and making sure they are compliant.

Global businesses have spent the last decade, and a couple of billions of dollars securing their corporate networks and making sure they are compliant. But, when it comes to mobile devices, all the previous security and compliance holes that businesses have spent the last decade fixing are completely left vulnerable again – because personal and work mobile devices tend to bypass traditional controls.

Furthermore, security weaknesses tend to hide under the most unassuming digital apps and games. Pokémon GO iis an example: cybercriminals saw this loophole and added malicious code to the original app, and they then spread malicious versions via […] Read more

The year 2016 saw various enterprises in finance, healthcare, government, and energy sectors adopting mobile security solutions to safeguard their data.

The year 2016 saw various enterprises in finance, healthcare, government, and energy sectors adopting mobile security solutions to safeguard their data.

The year 2016 saw various enterprises in finance, healthcare, government, and energy sectors adopting mobile security solutions to safeguard their data. A Gartner adds a prediction that, “By 2019, 25% of mobile-ready enterprises will deploy mobile threat defense capabilities on enterprise-issued mobile devices*quot*.

This is unsurprising seeing how security threats have increased in a short period of time. The Computer Crime and Intellectual Property Section (CCIPS, USA) states that there was a 300% increase over 2015, where 1,000 ransomware attacks were seen per day. Any business seeing these numbers would be alarmed. 

Is your business secure? Discover the new world of enterprise mobility. […] Read more

Discover the new world of enterprise mobility.

Discover the new world of enterprise mobility.

A study by Gartner showed that as much as 43% of small medium enterprises go out of business as a result of data loss, while only 6% survive and remain unaffected by a data loss incident. This alarming statistic concludes the importance of an enterprise solution in an increasingly mobile environment for small medium enterprises as much as their larger counterparts.

While large multinational companies have the resources to set up systems and processes to tackle data security issues, small medium enterprises should not have to feel intimidated about the seemingly daunting cost of an enterprise mobility solutions.

Fortunately, there are options […] Read more

Discover the new world of enterprise mobility.

Discover the new world of enterprise mobility.

Did you know that a Forbes survey recently found that more than 3 out of 4 employees use their personal devices in the workplace or for work-related activities? When you put that 75%+ against the percentage of employers who have a coordinated and comprehensive mobile security strategy in place (10%)… you start to get an idea of why this disparity has become a serious issue for business owners.

When data gets compromised, the implications are potentially damaging. Imagine having the blueprints to your next best selling product, your customer data or worse yet, your financial data stolen? Rectification could then be […] Read more