COVID-19: How Do I Work from Home Securely?

Credit to Author: Trend Micro| Date: Tue, 31 Mar 2020 12:42:06 +0000

The coronavirus pandemic—the infection officially designated as COVID-19—is causing upheaval across the globe. Aside from the serious economic and public health implications, one very practical impact of shelter-in-place dictums is to force many companies to support remote working where they can. The most recent data tells us that in 2017, eight million Americans worked from…

The post COVID-19: How Do I Work from Home Securely? appeared first on .

Read more

Are you secured when dealing with money on your mobile phones?

Credit to Author: Quickheal| Date: Thu, 19 Mar 2020 07:55:57 +0000

The sheer convenience of shopping and banking with mobile phones has made it an exceedingly popular device for digital transactions. According to a KPMG report, digital payments are estimated to see a CAGR of 12.7 percent in the number of non-cash transactions by 2021. The growth is being driven by…

Read more

Unifying security policy across all mobile form-factors with Wandera and Microsoft

Credit to Author: Todd VanderArk| Date: Wed, 19 Feb 2020 17:00:17 +0000

The way we work is evolving. Technology enables more effective employees by helping them to be productive where and when they choose. Businesses also enjoy the productivity benefits of a connected workforce.

The post Unifying security policy across all mobile form-factors with Wandera and Microsoft appeared first on Microsoft Security.

Read more

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

Credit to Author: Lucas Mearian| Date: Wed, 12 Feb 2020 13:18:00 -0800

BlackBerry has unveiled its Digital Workplace platform, a web portal and workspace for secure online and offline access to corporate on-premise or cloud content,  including Microsoft Office 365 resources.

Digital Workplace, announced last week, integrates a secure browser-based workspace sold by Awingu, a Belgium company that penned a partnership with BlackBerry in 2018. Businesses can access their legacy Windows, Linux, SaaS or internal web apps, desktops and files inside of Awingu’s secure managed browser. Awingu’s unified workspace runs Windows, Linux, web and intranet apps.

To read this article in full, please click here

Read more

The Everyday Cyber Threat Landscape: Trends from 2019 to 2020

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 13:15:04 +0000

The past 12 months have been another bumper year for cybercrime affecting everyday users of digital technology. Trend Micro blocked more than 26.8 billion of these threats in the first half of 2019 alone. The bad news is that there are many more out there waiting to steal your personal data for identity fraud, access…

The post The Everyday Cyber Threat Landscape: Trends from 2019 to 2020 appeared first on .

Read more

Security resolutions for 2020 to stay safe online!

Credit to Author: Pavan Thorat| Date: Tue, 31 Dec 2019 12:31:33 +0000

As we are about to enter the new year, it’s ritualistic to reflect on our experiences from the passing year and make resolutions for the New Year. Most people make resolutions around good heath, their life goals, etc. Here is a different angle to our routine resolutions’ list – Security…

Read more

Mobile threat defense and intelligence are a core part of cyber defense

Credit to Author: Todd VanderArk| Date: Thu, 19 Dec 2019 17:00:32 +0000

To safeguard company assets, organizations need to augment their global cyber defense strategy with mobile threat intelligence.

The post Mobile threat defense and intelligence are a core part of cyber defense appeared first on Microsoft Security.

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Categories:

Tags:

(Read more…)

The post The little-known ways mobile device sensors can be exploited by cybercriminals appeared first on Malwarebytes Labs.

Read more