Loading the content...
Tag archives for:

Check Point

Android devices face a sharp increase in mobile cybersecurity threats

With massive attacks like the Equifax data breach constantly filling the news cycle, individuals and companies should be on high alert regarding cyber dangers. Unfortunately, new research shows we’re far from where we need to be in terms of mobile threat prevention efforts. Avast released research last week showing a 40% increase in attacks year over year from Q2 2016 against Android smartphones and tablets. Specifically, researchers cite rooters, downloaders and fake apps as the top three mobile cybersecurity threats to Android devices.
Read More

Chinese malware Fireball reportedly infects corporate networks worldwide

Earlier this month, our partner company, Check Point, announced the identification of a new high-volume threat operation taking over target browsers and turning them into zombies. Check Point claims the Chinese malware Fireball has affected up to 250 million computers around the globe, though Microsoft now estimates the figure may be closer to 40 million. Regardless, this browser hijacker may have also impacted up to 20% of corporate networks and therefore is a major concern for employers worldwide. Read More

Cyber Threat Alliance to improve intelligence through cooperation

The future is no longer on a distant horizon: Mobility has overtaken the desktop as a fundamental part of how business is conducted; cloud adoption is prompting businesses to transform how they roll out applications and services with the promise of a more agile and automated IT infrastructure; IoT is connecting greater numbers of devices; and big data is gathering information on everything from telemetry readings of sensors to how many calories have been burned during an afternoon walk. The security implications among all of these elements are significant. Read More

Check Point identifies Gooligan, new Android malware campaign

After thorough research performed by our mobile threat prevention (MTP) partner, Check Point, a new and alarming type of malware campaign has been identified. Known as Gooligan, this malware is used to generate ad revenue on the Android platform. Check Point noted that as of the end of November, Gooligan had breached the security of more than one million Google accounts, with an additional 13,000 devices being impacted each day. Read More

Best practices for international BYOD usage

As cybersecurity presents an increasingly complex and concerning environment for personal, business and government safety, attention to the secure use of mobile devices is more important than ever for individuals around the world. In fact, recent news of cybercriminals and hackers having connections deeply rooted in the Russian government, as well as the thousands of unauthorized “app stores” hosted in China, has underscored the growing number of threats in existence — and therefore a clear need to be proactive. Read More

Mobile Brew attendance doubles in year two

As secure enterprise mobility becomes an increasingly relevant business objective, IT executives and professionals are looking for ideas, insights and best practices on finding a better balance between employee preferences and company priorities. Therefore, it’s no surprise that we experienced such an uptick in attendance at Tech Orchard’s second annual Mobile Brew. More than 110 attendees from top Kansas City companies joined us at Boulevard Brewery for networking and a valuable panel discussion on mobility essentials.

The event kicked off as Mike McRoberts, Business Development Expert & Former Sprint Executive, shared a thought-provoking story about how IT teams can leverage the benefits of expanding their use of cloud services, especially for mobile initiatives. Then, Tech Orchard CEO Phil Poje addressed a panel of speakers about the challenges and opportunities around enterprise mobility management (EMM) and mobile threat prevention (MTP) in the workplace. Panelists included Keith Shaw, manager of security engineering and operations for H&R Block Inc.; Cora Belfiore, director of IT operations at Winston & Strawn LLP; James Robertson, owner of Core BT Solutions; and Randy Crenshaw, vice president of mobile technology at Tech Orchard.

KC Business Journal’s tech beat writer Leslie Collins captured some of the most valuable panel commentary in her article “Tech Orchard panel: How employers can address mobile security issues.” Attendees in the audience were able to ask questions and generate additional conversation about how they can better incorporate a comprehensive mobile strategy moving forward. Immediately following the conclusion of the panel, employees from our sponsor companies took the stage to share a little about their businesses. Sponsors included VMware, Check Point, Trabon, UPS, BalancePoint, Centriq Training, Netrality Properties, Network Technology Partners (NTP), Quark Studios and Source Inc. Wireless Solutions. Door prizes were given away to six lucky winners while everyone in attendance enjoyed tasty appetizers and local craft brews while networking with colleagues and peers.

With no sign of mobility adoption slowing across the enterprise, we’re already looking ahead to expanding our panel and attendance at our third annual Mobile Brew in the fall of 2017. If you had the opportunity to attend and have any outstanding questions that weren’t answered either by our panel or during your networking, please don’t hesitate to call or email Phil, Randy or Mila. If you weren’t able to attend, be sure to read our KC Business Journal coverage and reach out for assistance with any enterprise mobility needs you may have or expect to arise within your organization in the days ahead.

Mobile Brew 2016 Recap

For complete photo coverage, check out our Facebook album with pictures of the event, attendees, prize winners, panelists and more!

Back to top