<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security &#8211; Scolvo</title>
	<atom:link href="https://scolvo.com/corinfo/blog/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://scolvo.com/corinfo</link>
	<description>work.regardless</description>
	<lastBuildDate>Wed, 10 Jan 2018 09:01:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.4</generator>

<image>
	<url>https://scolvo.com/corinfo/wp-content/uploads/2020/07/ic_launcher.png</url>
	<title>security &#8211; Scolvo</title>
	<link>https://scolvo.com/corinfo</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enterprise Mobility in 2018: What to Expect?</title>
		<link>https://scolvo.com/corinfo/blog/2018/01/10/enterprise-mobility-2018/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Wed, 10 Jan 2018 09:01:41 +0000</pubDate>
				<category><![CDATA[Trends]]></category>
		<category><![CDATA[2018]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AR]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=19379</guid>

					<description><![CDATA[<p>As well as presenting a heap of opportunities with previously unforeseen mobile capabilities, 2018 will challenge businesses in all phases of mobilization with several threats (e.g., data leakage). Here are some global expectations for the year 2018. &#160; AI and AR Will Extend Our Mobile Boundaries The rise of artificial intelligence didn’t even leave business [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2018/01/10/enterprise-mobility-2018/">Enterprise Mobility in 2018: What to Expect?</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">As well as presenting a heap of opportunities with previously unforeseen mobile capabilities, 2018 will challenge businesses in all phases of mobilization with several threats (e.g., data leakage). Here are some global expectations for the year 2018.</span></p>
<p><span id="more-19379"></span></p>
<p><img class="aligncenter size-full wp-image-19381" src="https://scolvo.com/wp-content/uploads/2018/01/2018-expectations.jpg" alt="2018" width="892" height="595" srcset="https://scolvo.com/corinfo/wp-content/uploads/2018/01/2018-expectations.jpg 892w, https://scolvo.com/corinfo/wp-content/uploads/2018/01/2018-expectations-300x200.jpg 300w, https://scolvo.com/corinfo/wp-content/uploads/2018/01/2018-expectations-768x512.jpg 768w" sizes="(max-width: 892px) 100vw, 892px" /></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">AI and AR Will Extend Our Mobile Boundaries</span></h1>
<p><span style="font-weight: 400;">The rise of artificial intelligence didn’t even leave business mobiles untouched: </span><a href="http://sunsoftonline.com/2017/12/06/ar-vr-defining-new-era-enterprise-mobility/"><span style="font-weight: 400;">it has made its way to the workplace</span></a><span style="font-weight: 400;">. Its capabilities of predicting decisions in basic scenarios have already proved to be an essential addition to the arsenal of efficiency-boosting methods, and some predict </span><a href="https://www.itproportal.com/features/artificial-intelligence-and-the-future-of-enterprise-mobility/"><span style="font-weight: 400;">it will be everywhere by 2022</span></a><span style="font-weight: 400;">.  </span></p>
<p><span style="font-weight: 400;">AI will only gain further ground because of its analytics capabilities in 2018, as businesses increasingly feel pressured to use their data assets. The Internet of Things (IoT) is making the data situation only more pressing. With streamlining business processes, AI can be another excellent tool for savings costs. Meanwhile, the networks are being strengthened with 5G to be able to provide the analysis and insights in the shortest possible timeframes. </span></p>
<p><span style="font-weight: 400;">We are still to see, though, in 2018, where augmented reality (AR) will lead our businesses. There are some obvious applications in the utility sector or in retail that are already taking shape, and the software part of the equation is well-covered anyway. One important thing is still lacking, though: </span><a href="https://www.engadget.com/amp/2017/12/20/vr-and-ar-in-2018/"><span style="font-weight: 400;">a proper headset</span></a><span style="font-weight: 400;">, that would make business put AR in practice (of course </span><a href="https://www.engadget.com/2017/11/21/apple-buys-company-making-mixed-reality-headset/"><span style="font-weight: 400;">Apple</span></a><span style="font-weight: 400;"> and </span><a href="https://www.engadget.com/2017/11/01/microsoft-hololens-hard-hat-european-expansion/"><span style="font-weight: 400;">others</span></a><span style="font-weight: 400;"> are working hard already on solving this problem). </span></p>
<p><span style="font-weight: 400;">On the other hand, the user experience is evolving in many different ways, too. Mobile has the most significant impact of all, prompting the transformation of corporate websites to mobile-first format and progressive web apps. The voice/speaking and chat options penetrate all interfaces, making getting work tasks done and team collaboration easier &#8211; thus improving overall efficiency.</span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">Services in the Cloud and Other Locations</span></h1>
<p><span style="font-weight: 400;">In the age of ubiquitous connection, offering location-based services is one of the most promising areas of development. For enterprise mobility, it means being able to track workers everywhere, all the time, and helping them with that. Wherever a problem emerges, the office workers can have the backs of their field colleagues: think maps, blueprints, instructions, client data. All employees can save time by using geo-tagged photos and indoor navigation to products in a store or service stations in an office, as popular examples. </span></p>
<p><span style="font-weight: 400;">Similarly, selected information can be made available to clients, allowing them to see whether the maintenance worker is on the way or the sales agent is in a place where he can be available for a call. Customers in specific areas can be shown particular promotions or offered specific benefits or discounts.</span></p>
<p><span style="font-weight: 400;">Cloud services are also on the rise like never before, due to the significant service price drops and the ever-growing popularity of BYOD &#8211; smartphones flooding the workplaces. But businesses have also realized that not every type of data is worth to be trusted to the cloud, so, for security reasons, we will likely see the on-premise storages remain in place for the most business-critical information.</span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">Security Threats in 2018</span></h1>
<p><span style="font-weight: 400;">New devices, new operating systems, new (consumer) apps &#8211; they all pose a threat in the workplaces </span><a href="http://www.information-age.com/enterprise-mobility-trends-2018-123469550/"><span style="font-weight: 400;">increasingly relying on BYOD</span></a><span style="font-weight: 400;"> (again). </span><a href="https://www.csoonline.com/article/3241727/mobile-security/5-mobile-security-threats-you-should-take-seriously-in-2018.html"><span style="font-weight: 400;">Security experts warn </span></a><span style="font-weight: 400;">that accessing corporate data with poorly secured consumer devices and apps can be one of the most significant challenges to the IT-departments this year. </span></p>
<p><span style="font-weight: 400;">One solution to these pains can be AI itself, with its capabilities of recognizing misuse and signs of breach earlier. The protection will have to be set to prevent the data from leakage, like scanning new apps for these properties. But sometimes even that is not enough, like in the case of phishing and other elaborate methods of hacker trickery, against which further training of employees can be a viable solution. </span></p>
<p><span style="font-weight: 400;">Surprisingly, ransomware is </span><a href="https://www.csoonline.com/article/2912408/malware-cybercrime/lightning-strike-more-likely-than-mobile-malware.html"><span style="font-weight: 400;">not at all that common</span></a><span style="font-weight: 400;"> of a threat than one would imagine &#8211; most breaches we hear about happen on desktops instead. Mostly because app stores do a proper job screening new applications and enterprise apps apparently don’t contain malware, and those are the ways people get their software. On desktops, it is easier for hackers to hide a malicious piece of code and cause significant trouble. </span></p>
<p><span style="font-weight: 400;">All that doesn’t mean, though, that businesses don’t have to be alert to such options on mobiles. The continuous evolvement of malware (especially ransomware) techniques makes them a real threat if once an efficient way of installing them on mobiles is found.</span></p>
<h1><a href="https://scolvo.com/scolvo-sales-ultimate-personal-selling-machine-financial-institutions-arrived/?utm_source=blog-new-assessment&amp;utm_medium=blog&amp;utm_campaign=FS&amp;utm_content=EN"><b>SCOLVO Sales – The ultimate selling machine for financial institutions has arrived:</b></a></h1>
<p><a href="https://scolvo.com/scolvo-sales-ultimate-personal-selling-machine-financial-institutions-arrived/?utm_source=blog-new-assessment&amp;utm_medium=banner&amp;utm_campaign=FS&amp;utm_content=EN"><img class="aligncenter size-full wp-image-18843" src="https://scolvo.com/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177.jpg" alt="financial services brochure" width="1024" height="177" srcset="https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177.jpg 1024w, https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177-300x52.jpg 300w, https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177-768x133.jpg 768w, https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177-1000x173.jpg 1000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2018/01/10/enterprise-mobility-2018/">Enterprise Mobility in 2018: What to Expect?</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</title>
		<link>https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Mon, 11 Sep 2017 07:20:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=18344</guid>

					<description><![CDATA[<p>Due to some recent major cyber attacks like Petya and Locky, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Due to some recent <a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">major</a></span><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html"><span style="font-weight: 400;"> cyber attacks like Petya an</span></a><span style="font-weight: 400;"><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">d Locky</a>, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. </span></p>
<p><span id="more-18344"></span></p>
<p><span style="font-weight: 400;">Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also some useful tips on how you can protect your business from such attacks. And not only on the good old desktop: as smartphones are on the way to become the most used devices in the workplace, you need to get ready to protect them as well!</span></p>
<p><img class="aligncenter size-full wp-image-18346" src="https://scolvo.com/wp-content/uploads/2017/09/ransomware.png" alt="mobile ransomware" width="1000" height="750" srcset="https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware.png 1000w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-300x225.png 300w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-768x576.png 768w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-94x70.png 94w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-600x450.png 600w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-900x675.png 900w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Business desktops under attack again</span></h2>
<p><span style="font-weight: 400;">Malicious code that blocks access to data or a whole computer by encrypting the files seems a successful recipe for easy money and extensive media attention. They provided an opportunity to talk digital security strategies good and bad as </span><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack"><span style="font-weight: 400;">WannaCry</span></a><span style="font-weight: 400;"> hit corporations like Renault, Deutsche Bahn, and FedEx, and </span><a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe"><span style="font-weight: 400;">a reinvented version of Petya </span></a><span style="font-weight: 400;">made its way to Russian and Ukrainian banks, Maersk, and WPP. </span></p>
<p><span style="font-weight: 400;">And this is not ‘just’ about the desktops anymore. With less publicity, attacks such as <a href="https://nerdssupport.com/rise-android-trojan/">Fusob</a>, <a href="https://threatpost.com/svpeng-behind-a-spike-in-mobile-ransomware/126533/">Svpeng</a>, and SMALL, also threatened mobile devices and systems  </span><span style="font-weight: 400;">&#8211; just to mention a few. Enterprise mobility is no safe territory, anymore, and the vulnerability goes further than a weak endpoint: we&#8217;re talking about personal consumer devices storing or accessing company data. </span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Corporate security strategies revised</span></h2>
<p><span style="font-weight: 400;">The broad reach of attacks forced many companies to alter their security policies regarding user control, transparency, the IT-departments’ role, and general awareness, especially as more and more enterprise software has its mobile version developed. </span></p>
<p><span style="font-weight: 400;">The risks can no longer be denied: there is much to do about:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A workforce that is increasingly mobile but not necessarily more experienced in protecting corporate data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The volume and types of devices used in a workplace and how these devices handle data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Reshuffling IT’s priorities: taking security measures, educating a wider group of stakeholders. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Analysing all the possible effects of a data breach on the business.</span></li>
</ul>
<p><span style="font-weight: 400;">Besides the prevention measures mentioned above, you will also need protection. For example, anti-virus software makers are also adding their part in preparing for more assistance and expanding even more in the mobile space. </span></p>
<p><span style="font-weight: 400;">Symantec was the last to make the news with two recent acquisitions: </span><a href="https://thestack.com/security/2017/07/12/symantec-to-acquire-israeli-mobile-security-startup-skycure/"><span style="font-weight: 400;">the Israeli Skycure</span></a><span style="font-weight: 400;"> with a focus on predictive threat detection, and </span><a href="http://investor.symantec.com/About/Investors/press-releases/press-release-details/2017/Symantec-to-Acquire-Fireglass-to-Bring-a-Generational-Leap-Forward-in-User-Protection/default.aspx"><span style="font-weight: 400;">Fireglass </span></a><span style="font-weight: 400;">with a browser isolation technology that helps to stop the spreading of malware. </span></p>
<p><a href="https://hitinfrastructure.com/news/trend-micro-adds-mobile-security-device-monitoring-tools"><span style="font-weight: 400;">VMWare has partnered up with Trend Micro</span></a><span style="font-weight: 400;"> to provide better protection against mobile attacks. It does that by allowing IT-administrators to get a birds-eye view of their (ever-growing) network, quickly identify threats, and make more informed decisions based on what they saw.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Securing mobile business applications in a future-proof way </span></h2>
<p><span style="font-weight: 400;">The first step is to accept that every business is at risk: big or small, with or without a field team, working on any operating system. Also, every application is vulnerable to some extent. </span><span style="font-weight: 400;">Then, take time to understand your current type and level of protection, so you&#8217;ll know what you&#8217;re missing: this way, you can react faster in case of an attack.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">More focus on user behavior</span></h3>
<p><span style="font-weight: 400;">In protecting your data in association with mobile apps, user behavior is crucial. From this perspective, your Millennial workforce might be the more at risk. </span></p>
<p><span style="font-weight: 400;">With a security awareness training, you can educate your staff about best practices, such as regularly updating the apps they use and the safety implications of sending mobile data through public wireless networks. </span></p>
<p><span style="font-weight: 400;">The best business mobile apps update themselves automatically for more protection, but it&#8217;s always worth to double-check.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Application control </span></h3>
<p><span style="font-weight: 400;">As apps are becoming more and more dominant in the modern workplace, their integration becomes more important as well. The anti-virus software, the MDM or EMM should all work together in stopping any possible attacks and allow for maximum security. </span></p>
<p><a href="https://scolvo.com/2016/09/30/indispensable-security-solutions-mobile-app/"><span style="font-weight: 400;">Solutions </span></a><span style="font-weight: 400;">that are independent of the location of the data, like precisely setting access rights and multi-level identification app by app, generally work well. </span></p>
<p><span style="font-weight: 400;">The successful combination of these methods might vary by company, but the goal is clear: to pass </span><a href="https://scolvo.com/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/"><span style="font-weight: 400;">the five security checkpoints</span></a><span style="font-weight: 400;"> of a secure mobile business app. These checkpoints are the following:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure code. Developers use encryption, audits, reviews, testing, approval processes to make sure no malicious code could appear. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure data. Proper and up-to-date encryption of data ensures protection against misuse. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure access. Role-based access provides an extra layer of security to passwords. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure communication. The mobile app and the back-end should communicate with proper encryption and authentication protocols, like SSL/TLS. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure third-party services. The risk of each provider should be assessed and their security and risk management program revised. </span></li>
</ul>
<p><span style="font-weight: 400;">If you are aware of the industry standards, best practices, and user-generated issues that might have an impact on security, you have already taken a big step forward in securing your mobile business apps. </span></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
