article thumbnail

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer. About Fixmo.

Mobile 242
article thumbnail

AT&T Becomes the Latest Company Affected by Data Breach

CTOvision

The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.

Company 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Steps CIOs should take to protect customer data in Nigeria’s open banking systems

CIO Business Intelligence

Open banking is the only way you can set systems like agency banking, mobile banking and use dollars.”. The Operational Guidelines for Open Banking in Nigeria published by the CBN stress that customer data security is critical for the safety of the open banking model. Banking, Data and Information Security

Banking 118
article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

The group was confirmed to be the perpetrators in the attacks against NVIDIA, Samsung, T-Mobile, and Vodafone. In the T-Mobile case, Lapsus$ members hacked into T-Mobile’s network in March 2022 by compromising employee accounts, either via phishing or another form of social engineering.

article thumbnail

The Importance of an Online Encryption Policy

CTOvision

Though you may have the best IT department in the world and advanced computing resources, if there are no written methodical steps that will serve as guidelines or Standard Operating Procedure (SOP) for computing and data storage, then all these hiring-sprees of IT talents and investments are doomed to fail.

Policies 283
article thumbnail

The 7 Step to Develop and Deploy Data Loss Prevention Strategy

Galido

This chart provides general guidelines that your DLP strategy should follow, bear in mind that there are a number of fundamental activities that must occur when initiating a data loss prevention program. A robust data loss prevention must account for the mobility of data and the moments when data is put at risk.

article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. If you have an Information Technology Blog you would like to suggest, please submit a listing. Help Net Security.

Resources 107