On the spot

On the spot: Threats have become mobile

How should organisations protect mobile devices, increasingly the targets of malware and virus creators?

05 May 2013

As the world goes mobile, so do the criminals. This month, Brainstorm asks how end-point protection can help enterprises protect mobile devices against attack.

✹ In an age where information is viewed as ‘the new corporate capital’, data-rich companies are becoming an attractive target for hackers, who benefit from the consistent use of insecure networks, unauthorised data transfers and poor passwords. End-point protection is a quick and cost-effective way for enterprises to deploy an additional layer of security to all devices, particularly mobile. Options such as Two Factor Authentication (2FA) and the use of one-time passwords provide an added shield of verification to the network and data access process, making it tougher for cyber criminals to penetrate the digital business walls. Carey van Vlaanderen, CEO, ESET Southern Africa

ITWeb Premium

Get 3 months of unlimited access
No credit card. No obligation.

Already a subscriber Log in