Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. Continue reading Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

Which Third-Party Messenger App Is Best for Secure Business?

In October 2021, Facebook (now Meta), and all its platforms (Instagram, WhatsApp and Messenger) shut down across the globe for up to six hours, leaving billions without a messaging service. While Facebook engineers scrambled to fix the problem, users pivoted to other apps to stay connected. In the wake of the outage, Telegram added 70 […]

The post Which Third-Party Messenger App Is Best for Secure Business? appeared first on Security Intelligence.

Continue reading Which Third-Party Messenger App Is Best for Secure Business?

What is Ghimob Malware?

A new Android malware strain ‘Ghimob’ is mimicking third-party mobile (mainly banking) apps to spy and steal user data when downloaded and installed. This Trojan virus steals data from users, primarily targeting online banking and cryptocurrency. As of the end of 2020, it is believed to siphon data from more than 153 apps by asking […]

The post What is Ghimob Malware? appeared first on Security Intelligence.

Continue reading What is Ghimob Malware?

IoT Security: Be Aware of What You Connect at Home

Home IoT device adoption has grown by leaps and bounds. It’s a time of connected gadgets everywhere, and with them, comes security risks. McKinsey predicts the total number of IoT-connected devices will be 43 billion by 2023, with the vast majority being consumer devices. Most of these new devices connect via home routers (another IoT […]

The post IoT Security: Be Aware of What You Connect at Home appeared first on Security Intelligence.

Continue reading IoT Security: Be Aware of What You Connect at Home

Fix Shadow IT In Your Organization

Shadow IT can be potentially harmful to a company’s security protection, because it exists outside a company’s typical software and service approval and audit workflows. Shadow IT refers to information technology projects, applications and software used and managed outside of—and without the knowledge of—an IT department. Employees unfamiliar with the way software works can easily […]

The post Fix Shadow IT In Your Organization appeared first on Security Intelligence.

Continue reading Fix Shadow IT In Your Organization

How Unified Policy Management Can Enable Business Flexibility, Productivity and Security

Unified policy management that is integrated both horizontally and vertically can enable better flexibility, productivity and security benefits.

The post How Unified Policy Management Can Enable Business Flexibility, Productivity and Security appeared first on Security Intelligence.

Continue reading How Unified Policy Management Can Enable Business Flexibility, Productivity and Security

Clone or Swap? SIM Card Vulnerabilities to Reckon With

SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.

The post Clone or Swap? SIM Card Vulnerabilities to Reckon With appeared first on Security Intelligence.

Continue reading Clone or Swap? SIM Card Vulnerabilities to Reckon With

Enterprise Mobility Management Gets Personal

Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models.

The post Enterprise Mobility Management Gets Personal appeared first on Security Intelligence.

Continue reading Enterprise Mobility Management Gets Personal

Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.

The post Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners appeared first on Security Intelligence.

Continue reading Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

The post What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? appeared first on Security Intelligence.

Continue reading What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?