Will your company’s cyber-security plan stand up to this reality? Get educated on the new world of enterprise mobility.
[vc_row][vc_column][vc_column_text]A study by Dr. Zinaida Benenson at Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany on mock phishing attacks yielded surprising results: it seems users are even more vulnerable to phishing attacks than we thought! It turned out that 78% of people
Get educated on the new world of enterprise mobility.
[vc_row][vc_column][vc_column_text]A pwc reports that 32% of companies in their study were victims of cyber crime in 2016. It adds that most companies are still not adequately prepared for these attacks. In fact, only 37% of organisations have a cyber incident
Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.
[vc_row][vc_column][vc_column_text]John Stewart, senior vice president, chief security and trust officer of Cisco once said that “Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless
Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured.
[vc_row][vc_column][vc_column_text]Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured. Just imagine 200,000 new malwares being found everyday! It continues to evolve to bypass most levels of IT protection, which makes
According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.
[vc_row][vc_column][vc_column_text]According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals. What SMiShing does is that it tricks the user into clicking on a link in a text message; and that
Businesses need to understand that their data is not secure when mobile devices are not managed.
[vc_row][vc_column][vc_column_text]Businesses need to understand that their data is not secure when mobile devices are not managed. When staff use their mobile devices for work, they unintentionally compromise corporate data from email attachments and by storing documents in unsecure locations on
Imagine if the mobile devices of your employees are embedded with SIlverPush?
[vc_row][vc_column][vc_column_text]The Mcaffee Mobile Threat Report 2016 shared that a company from India has released an advertising software developer kit (SDK) called SilverPush that uses the mobile phone’s microphone to listen for near-ultrasonic sounds placed in TV, radio and Web advertisements.
Global businesses have spent the last decade, and a couple of billions of dollars securing their corporate networks and making sure they are compliant.
[vc_row][vc_column][vc_column_text]Global businesses have spent the last decade, and a couple of billions of dollars securing their corporate networks and making sure they are compliant. But, when it comes to mobile devices, all the previous security and compliance holes that businesses
The year 2016 saw various enterprises in finance, healthcare, government, and energy sectors adopting mobile security solutions to safeguard their data.
[vc_row][vc_column][vc_column_text]The year 2016 saw various enterprises in finance, healthcare, government, and energy sectors adopting mobile security solutions to safeguard their data. A Gartner adds a prediction that, “By 2019, 25% of mobile-ready enterprises will deploy mobile threat defense capabilities on
Discover the new world of enterprise mobility.
[vc_row][vc_column][vc_column_text]A study by Gartner showed that as much as 43% of small medium enterprises go out of business as a result of data loss, while only 6% survive and remain unaffected by a data loss incident. This alarming statistic concludes