Large enterprises targeted by mobile Trojans
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
post-template-default,single,single-post,postid-1303,single-format-standard,stockholm-core-2.4.3,select-child-theme-ver-1.0.0,select-theme-ver-9.9,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.6,vc_responsive

Large enterprises targeted by mobile Trojans

Mobile cyber threats are more common and more sophisticated than ever before, with a number of high profile threats in the past year.


Connected mobile devices are rapidly becoming a security threat to corporate IT, both IPhones and Androids. Virtual private networks (VPN), two-factor authentication, peer-to-peer proximity networking and commercial phone security applications can provide some protection. Avoiding the use of free Wi-Fi hotspots and automatic connections, ignoring unexpected communications, not jailbreaking phones and not using apps from untrusted sources are other important self-protection approaches. 

One of the key benefits of running iOS instead of Android is the secure design of iOS. Purchasing an iPhone and jailbreaking it eliminates this major benefit, and it isn’t much different than running a Windows computer with no security software installed. Therefore, the most surefire method of protection is to not jailbreak your iPhone or iPad.

See on Scoop.itSecure communication

The post Large enterprises targeted by mobile Trojans appeared first on Apptimate.

Source: Apptimate
Large enterprises targeted by mobile Trojans