Protecting Sensitive Data on Your Mobile Device

finjanmobileBlog, Mobile Security

Protecting Sensitive Data on Your Mobile Device

A 2015 survey of 2,000 office workers revealed that 73% of those polled had downloaded personal apps to tablets issued by their employers, while over 50% used their personal smartphones and devices to conduct company business. With the lines now blurred between personal and corporate, the data stored and transmitted on mobile devices is often a mix of personally identifiable … Read More

Human Behavior – the Achilles Heel in Mobile Security

finjanmobileBlog, Mobile Security

Human Behavior - the Achilles Heel in Mobile Security

The continued success of email phishing attempts and social engineering tactics, and the growing efficiency of the emerging breeds of mobile malware all attest to a fact that security professionals have been moaning about for years: Human beings (in this case, mobile device users) are the single most effective tool that cyber-criminals have in compromising security. In classical Greek mythology, … Read More

Mobile Device Privacy and Security – Challenges and Recommendations

finjanmobileBlog, Mobile Security

mobile device privacy

With some analysts predicting that by 2018, 25% of corporate data will pass directly between mobile devices and the cloud (avoiding network security perimeters) – and with an alarming 35% of workers in a Bank of America study admitting that their first thought of the day is to their smartphones, rather than their partners – it’s obvious that mobile technologies … Read More

Mobile Device Security – Smartphones are Becoming the New Target of Hackers

finjanmobileBlog, Mobile Security

mobile device security

For some years, cyber-criminals have been exploiting desktop operating system and software vulnerabilities, leveraging unpatched web browsers with vulnerable add-ons and using human psychology and social engineering tactics to ensnare unsuspecting users into revealing vital information, giving the perpetrators access to systems and networks, or simply acting as a conduit for malware. Now though, the focus for cyber-threat activity is … Read More