Malware, Masque and more: Protecting end users from their apps

Picture credit: iStockPhoto

It’s not easy for end users to determine if the app they’re using is malicious, and with the latest Masque Attack unveiled earlier last month, it will be harder than ever for IT to determine that as well. 

This most recent vulnerability affecting iOS devices revolves around third-party app installations on a user’s...

By Kevin Olivieri, 03 December 2014, 0 comments. Categories: Malware, Privacy, Security.

The three steps you should take to avoid a costly data fine

Picture credit: iStockPhoto

Jonathan Armstrong, data regulation advisor for Absolute Software and technology lawyer at Cordery

The increase in corporate mobile device use, fuelled by Bring Your Own Device (BYOD) and advances in technology, means there are many more ways in which data can be lost, whether through employee mistakes or malicious theft and sale of confidential information.

As a result, GRC (Governance, Risk...

By Absolute Software, 27 November 2014, 0 comments. Categories: Data & Analytics, Employee Education, Enterprise Mobility, Privacy.

Texas court ruling shows employers without BYOD policy are skating on thin ice

Picture credit: iStockPhoto

A federal judge in Texas has ruled an employer who wiped a fired employee’s personal device did not violate his privacy rights.

The ruling against Saman Rajaee, who was employed by Houston-based construction firm Design Tech until February 2013, sounds a warning to employers who don’t have a BYOD policy in place, according to legal experts.

Design Tech did not have a personal device policy; instead Rajaee, who had been working in residential construction for over a...

By James Bourne, 27 November 2014, 0 comments. Categories: BYOD, Enterprise Mobility, Privacy.