Monday, July 11, 2011

Cyber Security Today

Computer crimes and terrorist cybernetic acts constitute a real threat to the activities of organizations and companies working in the public and business alike; from establishing phishing sites to steal personal data, identity theft and theft of funds, through the introduction of viruses and other malicious software information systems to take over sites and disrupt national infrastructures of countries.
Whether for reasons of criminal or political parties and ideologies, whether business entities or public bodies, the consequences can be very severe and lead to real damage in the business activity and / or public enterprise:
• loss of critical information
• disruptions, and technological systems vulnerable to work stoppage
• disruption and vulnerability to business, public and political processes
• significant damage to the image of public business organizations
• disruption of national and security infrastructures

Hackers today are no longer kids playing from their garage. They are serious.

Monday, July 4, 2011

Security in mobile applications

Applications on mobile devices are now an integral part of the business activities of enterprises. These applications require externalization of enterprise information and making two-way interaction, anywhere, anytime. In addition, many applications store sensitive personal data, including business applications, sensitive or personal.
This expansion of the organization's boundaries to the "mobile world" brings a wide range of specific threats to the organization's critical data and therefore, companies wishing to join the mobile revolution, to be held properly against the security threats involved.
Here are some information security challenges in the mobile world:
1 - secure storage of sensitive information on mobile devices
2 - protection of sensitive information sending process for mobile (passwords, credit information, personal data etc.)
3 - dealing with hostile activity of hackers, viruses, spyware, malware and other applications
4 - preventing unauthorized access to personal information such as email addresses, location information and more
Get secured when it comes to your mobile devices.