Mobile & PC Security Notes

Mobile Security Information

RCR Wireless News

Mobile Security Set for Change

Adam Boone - Certes Networks

As 2014 came to an end, itʼs clear we closed out: “The year of the epic data breach.”

The IT security industry was buzzing about the mammoth Target data breach in late 2013. But no one predicted the escalating parade of hack attacks throughout 2014. The flood of breaches eventually made front-page news in mainstream media and cost hacking victims and credit card-issuing banks billions of dollars in breach cleanup, response expenses, lost valuation, lawsuits and damaged reputations. A recent entertainment company breach has raised the stakes further still, with the alleged theft of major motion pictures and celebrity data.

In 2015, what do these ongoing IT security issues mean for mobile devices in the enterprise?

We predict 2015 will feature a “perfect storm” of forces that will start to move “bring-your-own-device” programs and mobility management into an important new phase. We expect IT managers will start to shift from simply securing end devices to integrating mobile users into an enterprisewide security posture that controls user access to applications, regardless of location or device.

Read more ...

White Papers / Featured Reports

PC Security (email focus)


Encrypting Your Email

Eric Geier, PC World

Even if you never email sensitive information--social security numbers, banking info, business secrets, and so on--you should consider using encryption. Aside from capturing your email content and attachments, a miscreant could hijack your entire email account if you failed to secure it properly. In this article, I'll discuss what you need to encrypt, regardless of the particular email service you use.

What to Encrypt

To secure your email effectively, you should encrypt three things: the connection from your email provider; your actual email messages; and your stored, cached, or archived email messages. If you leave the connection from your email provider to your computer or other device unencrypted while you check or send email messages, other users on your network can easily capture your email login credentials and any messages you send or receive. This hazard typically arises when you use a public network (the Wi-Fi hotspot in a coffee shop, say), but an unencrypted connection can also be pose problems on your work or private network.

Your actual email messages are vulnerable as they travel over the Internet, after leaving your email provider's server. Bad guys can intercept a message as it bounces from server to server on the Internet. Encrypting your messages before sending them renders them unreadable from the point at which they embark on their journey to the point at which the intended recipient opens them.

If you leave your saved or backed-up email messages (from an email client program like Microsoft Outlook) on your computer or mobile device, a thief or snoop might be able to gain access to them, even if you've passwordprotected your email program and your Windows account or mobile device. Again, encryption renders them unreadable to the intruder.


White Papers / Featured Reports