Posts tagged with "Phishing"



Android 14 for Enterprise: Everything You Need to Know
Blog | Endpoint Protection · 31. October 2023
No matter the size or area of business, all organizations must have a proper cybersecurity strategy in place to protect their infrastructure and data from growing cyber-attacks, which include ransomware, data breaches, and malware threats. Preventing phishing attacks is crucial as they exploit human error, compromising sensitive data and causing financial and reputational damage to organizations.

Better data security in the post-pandemic world
04. May 2021
2020, meant it was one the busiest year on record for security teams as they fought off bad actors and adapted to new employee behaviours When the pandemic began, organisations believed remote working would be temporary, but as two weeks became six, and six weeks became six months and most of us remained at home. As we begin 2021, it has become too clear to many businesses that remote work is here to stay. In fact, Research from Ivanti/former MobileIron found that 80% of the global workforce...

Acquisition with Intent and The Rise of The Everywhere Workplace: Why Ivanti Is Moving Faster Than Ever During a Global Pandemic
09. April 2021
It's easy for businesses to drop into reactive survival mode during a crisis like COVID-19. Navigating rapidly changing conditions can make it difficult to think beyond immediate challenges. And yet, even – or perhaps especially – in a crisis, it’s imperative that companies execute strategies that will make them stronger in the long term. In the case of COVID-19, those strategies should support clients as they transition to new working conditions.

Not All Buzzwords are Created Equal: Real Applications of Zero Trust Security for IoT
17. March 2021
Zero Trust security. Some would say it’s the latest and greatest buzzword and this disposition is understandable given the amount of jargon introduced into the Information Technology market each year. With vernacular being used interchangeably like “AI,” “Machine Learning,” and “Deep Learning,” these words get stripped of their real significance.

VPN Remote Work
25. February 2021
Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.

Scary Mobile Philshing
10. February 2021
Mobile phishing attacks are getting so sophisticated that they can fool even the smartest of us. Cybercriminals can now intercept your call with a bank without you even noticing. But it’s not always greater sophistication that enables successful attacks.

7 Ways UEM Enhances Your Security
08. February 2021
Many things blur the line between endpoint management and security. Examples? Managing an endpoint. Configuring it. Performing application and software management. And patching the endpoint. The fact is, managing and securing a device is so interrelated that it makes sense for these two functions to come together in a single platform that can accomplish these, and other tasks needed in your IT organization. Here are the seven ways Unified Endpoint Management (UEM) can support security.

IVANTI/MOBILEIRON AS A LEADER IN WORLDWIDE UEM SOFTWARE
01. February 2021
Ivanti/MobileIron has been recognized as a Leader in the IDC MarketScape: Worldwide UEM software 2020-2021 Vendor Assessment. Read an excerpt of the IDC MarketScape evaluation of Ivanti/MobileIron in the UEM market, including:

GDPR - Krankenhauszukunftsgesetz
27. January 2021
Microsoft Teams is prone to the same phishing hazards, impersonation scams and privacy violations as email is, yet many users naïvely treat this and other workplace communications platforms with inherent trust. As a result, they often share sensitive information too freely or click links and open attachments that in an email they might ignore, warns a new report.

Hackers in action
15. January 2021
Hackers are smart people. They know that the fastest way into a target is to find the weakest point of entry. All too often, they find that access point through the marketing organization, which many hackers consider a "soft target." The main reason is fairly simple: Marketers are typically more public and visible — and therefore more exposed — than the rest of the company.

Show more