Swedish inflation is expected to have increased – presented at 8 o’clock

admin

Therefore, everyone should classify mobiles as endpoints

Published: October 4, 2022, 10:00 a.m. Updated: October 9, 2022, 10:11 p.m.Photo: Nina Jarlholt Despite a greatly increased threat picture, many companies still have shortcomings in their mobile security. Employees respond to work emails and chat on their personal phones without adequate protection, making the mobile an access point for cybercriminals. – By classifying the mobile as any endpoint, it is subject to the same policies and rules as other devices, says Damon Sabrkesh at Zimperium. Since 2010, Zimperium has provided the market with mobile and application security. Among the customers are a large number of high-profile organizations and Swedish companies in, for example, finance, public activities and the manufacturing industry. Damon Sabrkesh, Regional Director at Zimperium, now hopes that more people will gain an increased understanding of the enormous importance of proper mobile security. – Cybercrime is becoming increasingly sophisticated and organized, which means that the threat landscape against these devices is continuously worsening and becoming more complex. As both attack points and methods vary greatly, a comprehensive and flexible protection is needed that can keep all devices safe – including the phone. The mobile phone is a security riskDamon tells us that most people have learned common sense when it comes to their computer – you don’t click on anything and don’t download things you’re not sure about. Reason, however, is a bit of a mess when using the phone. – The mobile phone is a constantly present part of our everyday life and thus exposed in a way that the computer is not. We use it to text, write on social media and store vacation photos, while we may have installed Teams or email to be able to communicate with colleagues. That is enough for the mobile phone to pose a security risk and if you are exposed to an attack, you probably won’t notice anything.Get help from expertsMany claim that they have nothing to hide and therefore need not worry, but the criminals are rarely after the private individual. The mobile phone is just one vector of many that are used to access, for example, passwords, security-classified information or internal communication. – Maturity and awareness of these risks have increased, not least due to the development of society, and many are still unaware of the risks they may be exposed to for as individuals. That is why it is important to get help from experts. Important first stepThe absolutely most important first step, according to Damon, is precisely to classify mobile phones as endpoints – then the device is subject to the same policies and rules as other devices. Otherwise, the main thing is to be consistent; create user awareness, deploy a reliable device management (MDM) system, and then apply a Mobile Threat Defense (MTD) solution. – We combine MDM and MTD with a base in machine learning, which means that through analyzes of abnormal behavior we can detect and protect the entire phone or your applications, whether they are self-made or downloaded. We detect threats in real time, new and old, regardless of where they originate – from the device, from connected networks, from phishing or from app attacks. Should something affect the device, the system is triggered immediately and locks the company’s information. In this way, you can take advantage of all the advantages of the mobile phone in a safe way, concludes Damon. Read more about mobile security at Zimperium The article is produced by Brand Studio in collaboration with Zimperium and not an article by Dagens industri

Click to rate this post!
[Total: 0 Average: 0]
Next Post

El Salvador already has its new Bitcoin card powered by the Lightning Network

The Savior continues to bet on the creation of a Bitcoin-based ecosystem to significantly improve the exchange of value within the country and offer new, more efficient payment methods for salvadorans. Today we will be talking about a new card powered by the Lightning Network that will be powered by […]

Subscribe US Now