COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more
As of March 19, tens of thousands of companies worldwide are making major changes to reduce the risk of employees contracting COVID-19, by allowing remote working from home.
Working from home is a hard adjustment for anyone to make, especially for the employees of companies which have never permitted remote working before. These companies have to decide about remote work options in a short period of time, regarding how best to manage employees and keep them accountable when working from home.
Implementing Mobile Device Management (MDM) technology in place is an ideal first step towards offering sustainable remote work options. By enrolling […] Read more
As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the Movement Control Order, companies are determined to protect their employees and minimize the impact of COVID-19 by enforcing work from home policies. However, those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which companies have to […] Read more
Tips to stay safe while using a public Wi-Fi
Is public Wi-Fi security so bad that it is better to abstain from ever using it. Well, there are steps that you can take to prevent attacks or data breaches while being connected to a public Wi-Fi.
Use a VPN
A Virtual Private Network (VPN) provides you with ultimate protection in a public Wi-Fi. VPN creates a secure tunnel for your data, with your device at one end and the VPN server on the other. The tunnel on its own encapsulate the data packages. VPN adds a second layer of protection on the data […] Read more
Most of you folks might be reading this blog while connected to a public Wi-Fi. Well, I don’t blame you, with your local café, bookstore, restaurant, all offering it for free, it’s hard not to take advantage of this service. But, is public Wi-Fi safe?
Wi-Fi in itself has a number of security protocols to prevent hackers from snooping on your data. Wi-Fi security protocols are established by a non-profit organization called Wi-Fi Alliance. But, is this security capable enough to protect you from an attack.
Wi-Fi Security Protocols throughout the ages
WEP (Wired Equivalent Privacy) was the first security encryption protocol introduced […] Read more
Providing quality education for children and youth is one of the most important priorities of any society. Since information technology is spreading into every aspect of our lives with a lightning speed, it is only natural that educational institutions are willing to evolve and adapt their teaching methods to reach the modern standards and go beyond traditional ways of education.
It is proven that bringing mobile technology into a classroom improves learning efficiency, dramatically increases student engagement, makes the process easier, faster and more fun, promotes innovation and development and brings teaching experience to the next level. Tablets and smartphones are […] Read more
Enterprise mobility is ruling the business world and the influx of modern multiple devices accompanied by a plethora of platforms, applications, and networks have become the reality for today’s companies. But with technology comes power, and with power comes the responsibility to protect these devices, which are the carriers of mission-critical corporate data, user information and customer details from varied external threats, risks, and attacks. The mobile threat landscape is becoming increasingly sophisticated and a compromised device can do irreparable damage to a company. Hence, securing mobile devices from multiple threats has become a foremost concern for the organization’s IT […] Read more
The Knox platform’s patented Real-time Kernel Protection (RKP) is the industry’s strongest protection against kernel threats and exploits. RKP works seamlessly out-of-the-box, with no setup required. Simply powering on a Samsung Knox device provides world-class threat protection and attack mitigation. RKP supports the rest of the Knox security offerings to provide full security coverage without the typical gaps anticipated with mobile devices.
Why does kernel protection matter?
Kernel protection is central to device security and enterprise data protection.
A compromised kernel can leak sensitive data and even allow remote monitoring and control of the affected device. Other more commonplace protections like Secure Boot […] Read more
Samsung and Google have been diligently working to advance and secure enterprise mobility, and today we see improvements around both Google’s Android operating system and Samsung’s Knox platform that make it easier than ever for businesses to stay connected, protected, and productive.
Samsung launched Knox in 2013, designing a mobile security platform that was embedded into the hardware and software of most of its Android tablets and smartphones. We built a suite of IT solutions that leverage this platform and address a variety of business needs through the entire device life cycle. Today, we call this evolved platform Knox Platform for Enterprise (KPE).
During this time, Google […] Read more