article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 141
article thumbnail

Technology’s role in social sustainability

CIO Business Intelligence

Technology has a critical role to play in any organization’s social sustainability strategy. And according to a survey from NTT, a majority of senior executives recognize this and are actively working to harness digital technology and innovation to support their social sustainability initiatives. That number is set to grow.

Social 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

T-Mobile investigating hack that affected 37 million customer accounts

GeekWire

(GeekWire File Photo / Taylor Soper) T-Mobile disclosed in a regulatory filing Thursday that a hacker obtained data from about 37 million customer accounts using an API, or application programming interface. 25, and T-Mobile identified the bad actor Jan. The Bellevue, Wash.-based The hack started on or around Nov.

Mobile 138
article thumbnail

Exploring the digital impact in Northern Ireland’s health and social care system

CIO Business Intelligence

The pandemic accelerated the urgency for reform in health and social care around the world, which strained resources to unprecedented levels. Waiting lists have grown and diagnosis and treatments have been delayed or missed due to some of the burden the pandemic brought on the system. Watch the full video below for more insights.

Social 98
article thumbnail

Sophisticated Attacks Against Mobile Devices Surge 187%

SecureWorld News

In today's interconnected world, mobile devices have become an integral part of our lives, enabling seamless communication, productivity, and access to sensitive information. However, as reliance on mobile technology grows, so does the risk of cyber threats targeting these devices.

Mobile 79
article thumbnail

Driving towards smart mobility with intent

TM Forum

“Intent-driven autonomous networks for smart mobility” is a new Catalyst that demonstrates innovative, intent-driven management techniques for autonomous operation of V2X infrastructure in the Smart Mobility sector. These emissions occur every time a vehicle brakes, turns, or accelerates.

Mobile 130
article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower - Information Technology

” or “Are you developing for desktop, tablet, mobile, or all three?” Can you provide specific examples of different types of customers, what they need, and what the system will do for them? Ads, Viral/Social, SEO)? What’s the state of those systems? Are you targeting desktop, tablet, or mobile?