Loading the content...
Tag archives for:


Are you the weakest link (when it comes to data security)?

Data Security Weakest Link

In the popular quiz show from the early 2000s The Weakest Link, contestants answered questions correctly in working together to win as much money as possible. However, if a participant answered a question incorrectly, all money earned in a chain of right answers would be lost. At the end of each round, contestants voted off the individual who they saw as “the weakest link” from the round in order to increase their chances of earning more money and winning the jackpot. Read More

The 7 most common mobile device mistakes

By Phil Poje | CEO, TechOrchard

These days, consumers of all ages are finding themselves more and more attached to their mobile devices. In fact, recent data shows that nearly 69% of Americans own a smartphone and 42% of adults own a tablet.1,2 Yet with the vast benefits of mobility come an increasing number of security concerns for users. Read on to find out if you’re a culprit of the most common mistakes mobile device users are currently making.

Businessman with smartphone in cafe

1. Passing on a passcode – Creating a passcode for your device is the easiest and most effective way of protecting your data. If you’ve been passing up this quick fix, stop what you’re doing and implement one on your device now.

2. Ignoring important updates – When security vulnerability is detected on an app or your operating system, developers will issue an update to resolve the issue. Many new apps in particular are released with security flaws, so it’s important to protect yourself and your data. Continue to install updates on your device over time for optimal protection.

3. Mixing business with pleasure – Because our devices often make the transition from home to work and back, many users wind up storing work-related data on an unauthorized device. Yet doing so opens both you and your company up to a data breach. With a $100,000 minimum and $1 million average cost to address, you likely don’t want this kind of mistake on your conscience.

4. Opening the unknown – Hackers are finding new ways of infiltrating mobile devices, including by sending questionable emails and texts. These messages often contain spammy links or encourage you to download risky apps from third-party app stores. If you receive something unfamiliar, just say “no” to avoid exposing your device to malware.

5. Communicating company business – With social media integrated so deeply in our lives, it can be easy to write, text or tweet sensitive information about your company without even realizing it. Though most companies have a social media policy of some type in place to avoid these issues, inadvertently sharing pertinent company data can provide a feast for competitors.

6. Going EMM commando – Many companies and their IT departments understand the critical need for addressing mobility. Yet without implementing an Enterprise Mobility Management (EMM) solution to secure employee devices, vulnerability of company data still exists. As a growing number of employees use BYOD (bring your own devices) and corporate-provided devices for business purposes, incorporating EMM in your overall mobile IT strategy is a must.

7. Engaging with public enemy #1 – When you’re out and about, it can be tempting to connect to unsecured, public Wi-Fi networks for a quick Web session. What you may not realize is that you could be giving hackers direct access to your device data if you’re not careful. Rather than selecting just any free Wi-Fi connection, be sure to use the one managed by your favorite coffee shop or restaurant to avoid giving unfriendly onlookers a pass for viewing your device goods.

Need help navigating these security pitfalls on your mobile device? Contact TechOrchard at 913.685.1475 with questions or for more information on setting up an EMM platform that meets your business’s needs.

1 comScore’s U.S. Smartphone Subscriber Market Share, March 2014.

2 Pew Research Center’s Internet Project Omnibus Survey, January 2-5, 2014.

Hacker users find my iPhone feature to lock device and demand cash

By Justin Tolerman | May 27, 2014

iphone 5s revealed

Hackers have worked out a way to lock and control your iPhone, holding it at ransom in exchange for cash.

Reports have been coming in from Australia and New Zealand as a hacker group known by the name “Oleg Pliss” have been locking iPhones and iPads and demanding cash to be unlocked.

Many claimed that their iPhone started beeping and they saw the message: “Device Hacked by Oleg Pliss” as well as a demand for $50 to $100 to unlock it.

It is not clear how many people have been affected but judging from the number of tweets already released n the topic, it could be close to a few thousand.

The hack seems to be an exploit of the “Find My iPhone” feature which allows users to remotely lock their iPhones if they are lost or stolen.

Apple is yet to comment on the  breach however, it seems that users who have set up passcodes found they could regain control of their device by restoring it from a backup using iTunes on their computer.

Article sourced here

Back to top