Blog

3 basic smartphone security habits

Recently I am really focused on my habits. I try to weed out bad ones, and at the same time introduce and nurture good ones. I learned the theory reading first Charles Duhigg’s – The power of habit and later James Clear’s – Atomic Habits (by the way, I recommend both books to everyone!), and right now I am putting their tips and rules to practice – all the way from taking daily walks early in the morning, to spending less time with smartphone and tablet when with my family.

Manage your mobile devices in a smart way. Enterprise mobility strategies explained

Mobile devices are essential tools for any modern business. As much as they facilitate employees’ work, they also provoke significant concerns regarding costs, applications compatibility and most importantly security of data.

Security or privacy – which is more important on a mobile device?

Many organisations understand the need to protect and secure their data, even on employees’ private devices (if Bring Your Own Device policies are implemented) – the main threats which trouble the IT and security managers are potential loss or theft of data and lack of user awareness (based on a report we’ve done together with Computerworld in 2018 ).

Ignorance of the principles of information security is not an excuse

Uneducated employees are dangerous for the company. They could be on some kind of spree, that solving problems could be exhausting. This is true for any industry: clicking on an attachment or inserting an infected USB flash drive brought from home means the end, a cryptoware infects the company’s network, the work is paralyzed, the IT department is looking for up-to-date backups to restore drives encrypted by the virus and CEO calculates losses from downtime.

What is Mobile Threat Defence?

These solutions can be treated as the next generation of anti-virus software for mobile devices. MTD is a set of tools which allow protection of the mobile device and applications against “advanced” threats. What are these advance threats? To put it simply – anything other than simple data theft once the device is lost or stolen, installing an unwanted application or eavesdropping the network traffic to and from the device.

This site uses cookies. By using this website you agree to the use of cookies in accordance with the settings of your browser. Learn more.

I accept