Non-authentic devices and enterprise security – a ticking time bomb
Bring Your Own Device (BYOD) policies are becoming more prevalent as remote working and connecting ‘on-the-go’ are now commonplace for employees. However, keeping track of the various devices connecting to an Enterprise’s IT network can be difficult, as well as ensuring that those devices match the owner and are authentic. Any vulnerability opens up the potential for a major breach in security.
The danger of counterfeit devices on public WiFi networks
Public WiFi is an ubiquitous addition to consumer connection options today and is prevalent in coffee shops, restaurants, shopping malls and airports, providing a vital link to the Internet for people on the move (quite literally if we consider how many public buses and trains provide WiFi services to passengers). Unfortunately, convenience requires some sacrifices and where public WiFi networks are concerned and the risks one takes when connecting to these hotspots remain unseen to the vast majority of us.
Counterfeit smartphones and the threats they pose
Counterfeit and non-standard devices pose a real threat for business, consumers and regulators. Find out how you can manage this risk.