The Best Security Advice from Leading Experts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22
Next The Best Security Advice from Leading Experts-18 Next

Mobile Infections Are Happening Through PCs

A report from Alcatel-Lucent revealed a new threat to mobile networks: our PCs. In 2013 and 2014, half of the malware found on mobile networks came from PCs. This is because our devices are all interconnected through Wi-Fi connections, or smartphones and tablets are directly connected to PCs. In addition to using Windows as a gateway to mobile infections, cybercriminals are taking advantage of a familiar operating system that already has a rich malware ecosystem.

Patrick Tan, general manager of Network Intelligence at Alcatel-Lucent, said:

"The modern smartphone also presents the perfect platform for corporate and personal espionage, information theft, denial of service attacks on businesses and governments, and banking and advertising scams. It can be used simply as a tool to photograph, film, record audio, scan networks and immediately transmit results to a safe site for analysis."

It is another reminder of the importance of making sure all the basic security steps are followed – patching Windows and software immediately and having good security software on mobile devices.

Read more at Mobile Infections Happening Via Your PC.

Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.

In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.