News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Neurons manages IoT devices in healthcare
ivanti news

Ivanti extends the Neurons platform to manage IoT devices in healthcare and helps with management and protection. The whole thing can also be integrated into the MobileIron Cloud. Ivanti, has released Ivanti Neurons ™ for Healthcare, which improves the management of medical IoT devices and enables security teams to proactively identify and remediate vulnerabilities. Ivanti Neurons can also be integrated into the MobileIron Cloud and offers companies a central platform for devices with self-healing and self-securing functionalities as well as self-service for end users. With the new Application Service Mapping add-on for Ivanti ...

Read more

QR codes are a security risk for companies
MobileIron news

A new MobileIron study shows: QR codes pose a significant security risk for companies and consumers. QR codes are being used more and more frequently by German consumers. But only 20% of those surveyed prevent their security concerns from using QR codes. MobileIron, the mobile-centric security platform for the Everywhere Enterprise, announces the results of its study, in which 500 German consumers were asked about their attitudes towards QR codes. The results show that QR codes are becoming increasingly popular and are also being used more and more frequently in everyday life. The majority of respondents (56%) are in favor of the increased use of QR codes, although the majority ...

Read more

Study: Employees want more home office
Home office solution study

According to the new study by MobileIron, the future of work is the “Everywhere-Enterprise”. According to surveys, over 80% of employees worldwide want to work more from home and not work full-time in the office again. However: The security of mobile devices, apps and users must be a top priority for every CIO, as their employees work mobile in the new Everywhere Enterprise. MobileIron, the mobile-centric security platform for the Everywhere Enterprise, today announced the results of its new study: Over 80% of employees worldwide do not want to return to their office full-time, even though one in three (30%) employees need isolation ...

Read more

Top 5 phishing attacks
Phishing attack company

Phishing attacks are booming. This not only affects the individual consumer, companies are also increasingly feeling the consequences of these cyber attacks. With e-mails and other messages as “Trojan horses” for malware, hackers are increasingly able to get company and customer data, extort ransom for them and even paralyze entire businesses. The phishing attacks are becoming more and more obscure: they manage to appear very authentic under the guise of bills, business e-mails or private messages. Many managers are desperate and are even ready to pay ransom in the millions to save their business….

Read more

MobileIron: Mobile Phishing Protection for Everywhere Enterprise
Mail smartphone phishing

MobileIron Threat Defense expands to detect and remediate multi-vector threats. The solution thus protects iOS and Android devices from phishing attacks at the device, network and application level. MobileIron, the mobile-centric security platform for the Everywhere Enterprise, extends MobileIron Threat Defense (MTD) with mobile multi-vector phishing protection for iOS and Android devices. How MobileIron is helping companies ward off one of the greatest cyber security threats. With the extension, MTD offers a device- and cloud-based phishing URL database query that detects and corrects phishing attacks across all mobile threat vectors. MTD does this, for example, in text and SMS messages, instant messages and on social media ...

Read more

8 security tips for telecommuting companies
News B2B Cyber ​​Security

Many still work from home and that will not change completely after the pandemic. In order for this to work smoothly, the IT department must activate additional devices, use applications such as Zoom and provide secure connections to local and cloud services without endangering general data security. Here are eight ways IT can successfully implement secure teleworking for the workforce. Smooth activation and OTA provision for every device The first step is the registration of new users and / or mobile devices in a Unified Endpoint Management platform (UEM). In order to…

Read more