With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posts Tagged ‘hacking’
Posted on 12th Jan 2015 by Maria Barbieri in Enterprise Security
Posted on 14th Nov 2014 by Jennifer Dean in Enterprise Security
Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.
Posted on 7th Nov 2014 by Jennifer Dean in Enterprise Security
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?
Posted on 31st Oct 2014 by Jennifer Dean in Enterprise Security
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posted on 24th Oct 2014 by Jennifer Dean in Enterprise Security
C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.
Posted on 3rd Oct 2014 by Jennifer Dean in
What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?
Posted on 5th Aug 2014 by Xavier Larduinat in Enterprise Security
The digital world is swarming with security perils. April’s Heartbleed Bug was just the latest in a long line of threats looming over individuals and businesses, and according to PwC’s Global Economic Crime Survey 2014, one in four surveyed businesses had experienced cybercrime, with 11 per cent of them hit with financial losses of more than […]
Posted on 21st Jul 2014 by Xavier Larduinat in Enterprise Security
We now live in an age where reliable and fast information is of paramount importance in our daily lives. Whether banking, communicating, negotiating, or doing any form of business, information on-demand is crucial. Unfortunately, as we’ve become more dependent on access to on-demand banking, contact details, messaging etc., we’ve at times allowed vulnerabilities into our […]
Posted on 25th Apr 2014 by Alexandre Bordier in Enterprise Security
Anyone who works in a corporate environment knows that the CEO is often considered one of the most valuable assets within an organization, with access to contacts, sensitive and confidential information and knowledge of the wider industry. Many high-flying executives who travel a lot have chauffeur-driven cars or are given charter flights to minimize the […]
Posted on 2nd Dec 2013 by Agnes Hammond in Mobile
I’m occasionally asked: ‘Aren’t NFC payments vulnerable to hacking?” and “What if your NFC phone or card is stolen? Can’t someone just run off spending your money?” My answers are simple. Firstly, anything is vulnerable to hacking if it isn’t secured properly (even smart toilets); just make sure your NFC payment method is secured by […]