Email Alerts
-
Smishing: How to protect enterprises from SMS fraud
Learn more about protecting enterprises from smishing, or SMS fraud, in this expert response from Nick Lewis. Ask the Expert
-
Creating a company mobile phone policy to fight mobile phone malware
Are mobile phones the new frontier for money-making malware? In this expert response, Nick Lewis explains recent advancements in mobile malware and how your company can protect itself from them. Ask the Expert
-
AT&T email address security breach: Can hackers track a SIM card?
Recently, a security breach at AT&T exposed the email addresses of thousands of its customers, but that may not be the biggest threat. In this expert response, Nick Lewis explains what could be the result of this breach. Ask the Expert
-
Smartphone malware pre-installed: The next security threat
Pre-installed smartphone malware is a growing problem and security pros need to be aware of how this malware could creep into your organization. Ask the Expert
-
How do hackers bypass a code signing procedure to inject malware
In this expert Q&A, Michael Cobb reveals how malicious applications can actually be approved by Symbian's Express Signing procedure. Ask the Expert
-
How to set up a corporate cell phone management strategy
Mobile devices are ubiquitous in today's enterprise environments, but how can security pros keep them from becoming malware-laden, data-leaking devices? In this expert response, Mike Chapple gives pointers on a corporate cell phone management strateg... Ask the Expert
-
How easily can spyware be placed on a mobile phone?
John Strand reveals just how easy it is for malware and spyware to be placed on your mobile devices. Ask the Expert
-
Should enterprises ban USBs because the DoD banned them?
When creating a portable device security policy, should an organization take into account the policies of the federal government? In this security management expert response, learn what can be helpful to keeping USB devices secure. Ask the Expert
-
Do mobile devices put sensitive data at risk when used overseas?
Any wireless electronic device is subject to eavesdropping or infection, but the risk increases dramatically when traveling to countries where a device connects to a local service provider which may be government-controlled. Ask the Expert
-
Is the iPhone amenable to any method of email encryption?
When it comes to sending and receiving email, the iPhone offers some security benefits. Michael Cobb reviews the mobile devices' current email features and what messaging security mechanisms are on the way. Ask the Expert
Security Management Strategies for the CIO