Video Screencast Help

Security Community Blog

Showing posts tagged with Mobile Security
Showing posts in English
bduckering | 09 Nov 2011 | 1 comment

This year, we’ve seen unprecedented growth in the amount of mobile malware. From threats that simply seek to embarrass victims to those that exploit premium rate number billing to those that steal information, mobile malware is certainly on the rise. More and more enterprise customers I speak with are becoming aware of the threat posed by mobile malware and asking how they can defend against it.

However, despite mobile malware rightfully growing as a concern, it should be acknowledged that the threat it poses is not yet at the level of traditional PC-based malware. In fact, as highlighted by recent...

Clint M. Sand | 06 Sep 2011 | 0 comments

Originally posted to www.indefenseofdata.com

Recently a friend of mine lost her smartphone. She sent out a message to all her friends in her social network about how she wouldn’t have a phone for a few days. She also did the right thing and went to her mobile carrier and reported it lost, turning the service off. Unfortunately though she wasn’t using any smartphone feature to find her phone or remote wipe it. But at least she was able to make sure it had no access to rack up her phone bill.

All good right?

Unfortunately, her smartphone did not require a passcode to access the apps. Ugh. I asked her about this and she replied back that it was no big deal because she didn’t have any really private information on there, and if so, the phone had no 3g access anymore to send anything off of it. Also her password would...

bduckering | 11 Aug 2011 | 1 comment

One of the biggest issues facing IT today is user demand for greater mobility and increased personal choice in the devices they use. More and more employees are growing less willing to live with IT mandated devices. Choice is the new paradigm. On top of this, for many, their personal and business lives are coming together. Thus, our computing devices are increasingly being used for a blend of personal and business activities.

The massive proliferation of smart mobile devices has made this challenge – known as the consumerization of IT – more complicated. But it didn’t start there. It actually started a while ago with laptops and remote workers. Regardless, the issues are still the same: security and management. What smart mobile devices have added to the equation are many more platforms and operating systems to deal with, instead of just a single OS.

In a world where mobile devices are incredibly sophisticated, the risks surrounding these devices and...

nicolas_popp | 28 Jul 2011 | 0 comments

The two hottest areas in enterprise security are undeniably mobile and cloud. As small and large security companies go after the fast growing markets, few  seems to understand  that both markets will rapidly converge to be serviced through a single solution. Yet, it should not come as a surprise since both enterprise cloud and mobility are about enabling employees to access corporate resources and information from anywhere, any time.

Beyond the simple fact that mobile is about the cloud and the cloud needs to be  mobile, there are profound technology-driven drivers for mobile and cloud security solutions to become one. Unlike the PC platform that preceded  them,  IOS and Android heavily sandbox application and data, making them very poor platforms for security software developers to replicate yesterday's agent-based security approach. Turn yourself now to the cloud and it is the same dilemma. Since an enterprise does no longer run the...

AndroidProtector | 20 Jul 2011 | 1 comment

This year has been the worst for Android related security threats and I feel this is just the beginning. The SMS threats are not the most elaborate of threats,but they still pose problems. Attackers are using multiple payloads in there malware in order to give their malware more sophistication and more weapons. We are always in a constant war and now with mobile security threats rising to an extreme high we need to find new solutions in order for us to even have a chance at winning. Security is broken in Android and we need solutions that better protect us and not just mobile anti virus software,but new advancements in virus engines. Android is constantly being under attack by malware author's, but what's interesting is there starting to develop new features that are becoming tougher to beat. The multiple payloads in mobile malware and other impressive weapons are things that are very interesting to analyze, but a very beneficial weapon for attackers.

So where do we...

khoi | 08 Jul 2011 | 0 comments

Summertime! That means sunshine, travel…and additional data threats to your smartphone. What’s that? You don’t consider mobile security risks and summertime as going hand in hand? Well, consider this: As you and your employees take some well-deserved time off, will you be taking smartphones with you? Of course you will. And chances are you will be accessing corporate data. In fact, a recent Symantec survey on security habits of mobile device users revealed that 62 percent of corporate smartphone users access sensitive corporate information while on vacation, and 81 percent will at least be checking their business email accounts.

With a variety of looming threats, from unsecured networks to malicious apps, corporate smartphone users should carefully consider what they can do to make sure a vacation from the office doesn’t turn into a vacation from security. The following best practices will help you keep mobile devices secure.

  • Use the...
Sean Yarger | 08 Jun 2011 | 2 comments

 

Let’s pretend for a moment that you’re on a business trip. You hear the boarding call for your flight and reach down to grab you laptop – only your laptop isn’t there. Whether it was left at security or snagged by another traveler in the terminal, your laptop is gone and your company data is at risk.

 

So what do you do? Typically you’ll need to make a call to the office, notifying your IT department of the incident. This call will initiate a chain reaction of events set into place to ensure measures are taken to secure the files and equip you with a new device to keep business running as usual. This process typically involves a series of forms, approvals, signatures, etc.

 

While it may sound simple, enforcing processes with effectiveness is one of hardest things for companies to do. With multiple people involved and steps required, any number of things can go wrong, slowing down the process –...

Chad Dupin | 01 Jun 2011 | 0 comments

ITS Partner is looking to hire a few Symantec Security Consultants / Engineers.

 

Location

West Michigan / Grand Rapids, MI Area.

Job Summary

This position will be focused on the implementation of Symantec security products within various customer environments. Job responsibilities include assessing customer needs and expectations, designing solutions to meet those needs, and then implementing the design. In addition to these activities the consultant will participate in the sales process (proposal creation, presentations, sales calls, demos, etc.). This position has the opportunity to grow into a leadership role within ITS to help guide and direct the security team.

Preferred Technical Qualifications

  • Symantec Endpoint Protection
  • Symantec Endpoint Encryption
  • Symantec Data Loss Prevention
  • Control Compliance Suite
  • PGP

Technical Knowledge

...
Spencer Parkinson | 19 Apr 2011 | 1 comment

More than ever before, smartphones are keeping us connected both personally and professionally. Because most of us have a preference as to the ideal smartphone, IT departments are increasingly being tasked with managing a mix of business-liable and employee-liable devices. This trend has become known as the consumerization of IT.

Symantec has developed a short survey to get smartphone end users’ perspectives on this trend. We’d also like to learn more about how your employer is managing the growing use of smartphones, especially those being purchased and brought into the organization by employees. The quick five minute survey can be found here: http://bit.ly/gsdgmX.

Once you’ve taken the survey, please stay tuned to this blog as we’ll be sharing the results once the survey is complete.

Christina Rohall | 15 Apr 2011 | 0 comments

Symantec's Nico Popp talks about NSTIC (national strategy for trusted identities in cyberspace) in light of today's event in Washington:

The White House today announced its official National Strategy for Trusted Identities in Cyberspace (NSTIC). NSTIC is the largest-ever effort by the federal government and private sector partners (including Symantec) todevelop a secure, standards-based and interoperable online identity system. The goal: Improve the security and privacy of online interactions and more effectively fight cybercrime. Today’s announcement marks the culmination of two years of effort by VeriSign(first as an independent company and later as part of Symantec) to help bring this important initiative to life.

At...