At Tech Orchard, weâ€™ve spoken with clients and written about the importance of taking precautionary security measures to protect mobile devices. For most users, the first step is setting a password to lock their smartphone or tablet. PINs and thumbprints are options available on devices from various manufacturers, while pattern lock is widely used as a mechanism for authentication and authorization on Android devices. Unfortunately for pattern lock users, this security method may be anything but secure.
Each year, we take a moment to reflect on recent experiences helping companies discover meaningful mobility and detail our expectations in this space for the coming year. Below are not only our top five mobility predictions for 2017, but quick tips on how you can address them in your organization.
Early this year, we all watched the legal battle between Apple and the FBI unfold about access to the iPhone 5C used in the 2015 San Bernardino massacre. The feud ended, at least temporarily, on March 28 when the FBI withdrew its case from the courts after a third-party managed to unlock the device. With no real resolution provided, additional court cases have popped up surrounding the critical issue of digital privacy, and this month, the Florida Court of Appeals ruled that the government can force an iPhone user to release the passcode to unlock his/her phone.
After thorough research performed by our mobile threat prevention (MTP) partner, Check Point, a new and alarming type of malware campaign has been identified. Known as Gooligan, this malware is used to generate ad revenue on the Android platform. Check Point noted that as of the end of November, Gooligan had breached the security of more than one million Google accounts, with an additional 13,000 devices being impacted each day.
Protecting your privacy and keeping data secure on a computer, whether running a Windows, Mac or other operating system, is more important than ever in todayâ€™s internet and cybersecurity environment.Â Many Apple users assume that the Mac OS is more secure and less prone to exposure. While partially true, the reality is no OS is totally immune from phishing attempts, man-in-the-middle attacks, malware-infected applications, or internet and email links to unsafe web pages. However, you can do more than you think to protect yourself and your Mac by taking control of some key system settings and paying attention to your computing habits.
As part of a comprehensive mobile strategy, many companies today choose to use one of a number of popular cloud-based file storage solutions, like Box, Dropbox or Google Drive. These tools provide users anytime access to the data they need from any device with an internet connection. Recently, Dropbox announced that its Dropbox Business product would be entering into a partnership with security vendor Symantec as part of a broader update to enhance its enterprise security credibility.