Remove Device Management Remove Malware Remove Mobile Remove Windows
article thumbnail

Why endpoint security will be a renewed priority for businesses of all sizes in 2023

CIO Business Intelligence

They achieve this via several means, but one of the most common is via phishing, which typically involves convincing someone to download a piece of malware from a legitimate-looking email that will then gather login data and other sensitive info that can give the criminals access to much more within the organisation.

article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

To be noted is the fact that a vulnerability scanner is as important as a malware scanner today. While a malware scanner helps check for malware and clear them, the vulnerability scanning tool could help prevent malware threats and attacks.

Tools 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The CTO made me do it - A Screw's Loose

A Screw's Loose

It didn’t help that security realized that the new devices were around and they weren’t locked down blackberries. You started to get some help when MDM (Mobile Device Management) products started to appear and let you get at least some control over the devices that were appearing, but you were almost always coming from behind.

CTO 70
article thumbnail

RIP MDM 200X ? December 16th 2011 - A Screw's Loose

A Screw's Loose

Mobile Device Management (MDM) is dead and many hardly knew you. I truly never thought you would hang on this long but you really managed to stick it out. MDM, we hardly knew you but just think, before you left this world you actually made people start to think about your progeny Mobile Application Management (MAM).

Mobile 62
article thumbnail

MIM ? For The Win - A Screw's Loose

A Screw's Loose

A few months ago I wrote a blogpost about how MDM (Mobile Device Management) had died. It was a slow painful death, but it was justified as it brought forth MAM (Mobile Application Management) and would lead to MIM (Mobile Information Management). Going Mobile. MIM – For The Win.

Mobile 63
article thumbnail

Identify yourself for MIM - A Screw's Loose

A Screw's Loose

Essentially he has built a Venn Diagram based around 3 concepts, Mobile Security, API Security, and Enterprise Security. He was kind enough to place things like MDM (Mobile Device Management) and MAM (Mobile Application Management) in the diagram for us. print Tagged as: Enterprise Mobility , MIM , Security.

article thumbnail

You saved how much? - A Screw's Loose

A Screw's Loose

As I wing off to another city this fine Monday morning, it seemed like the perfect time to talk about the economics of bring your own device (BYOD) and in this case we are talking mobile solutions. Now let’s take a look at managing these devices. print Tagged as: BYOD , Enterprise Mobility , Mobile Strategy.

Mobile 65