Category Archives: Blog
Demystifying mobile security
Your one-stop guide to mobile security acronyms and how the solutions fit together The tech [...]
Mobile Security and GDPR
If you access company info on your phone, you need think about GDPR GDPR applies [...]
Are employee phones leaking your customer data?
A data breach can cost your organisation heavily in fines, reputation, lost customers. MTD protects [...]
6 reasons why cybercriminals want to target your smartphone
The data is in, and it doesn’t look good: mobile devices are a primary target [...]
So what is MFA all about?
MFA (Multi Factor Authentication) or 2FA (2 Factor Authentication) is a simple yet effective way [...]
Setting a standard
“The nice thing about standards is that you have so many to choose from” – [...]
Five Common IT Security Vulnerabilities and How to Avoid Them
In this article, technical experts from our partners Appcheck are looking at five of the [...]
03
Jul
Jul
Gone Phishing
Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding [...]
10
Jun
Jun
Understanding Hash Values
What is that MD5/SHA-1/SHA-256 thing I see when I go to download an application? When [...]
05
Jun
Jun
Four simple tips to avoid being the low hanging fruit for cyber criminals
Before we start, relax! I’m not selling anything. If anything, I’m unselling. I’m not a [...]
26
May
May