Mobile App Security

June 19, 2019

We all use mobile apps everyday, and the sheer number of apps available in app stores continues to grow. This makes them a highly attractive target to mobile app hackers looking to exploit users sensitive personal information. So how secure is your mobile app? Users are constantly sharing this personal information with apps when they log-in, make transactions, and share their location data. Hackers certainly don’t have a shortage of mobile devices to target either, with 1 out of every 36 being compromised by a mobile security threat. Compromised devices can give these hackers access to the microphones, cameras, and GPS data.

Spotlight

Concord

Concord helps big companies untangle their technology messes. More than just making promises, we are the doers who get results. We focus on four core capabilities: Digital & User Experience, Cloud Applications & Integration, Data Solutions & Analytics, and Information Security.

Other Infographics
news image

Alarming Cyber Security Stats to Know in 2022

Infographic | June 29, 2022

Attackers use multiple tactics to get access to your credentials and among those phishing is the most commonly used method. Every 9 out of 10 cyber-attacks start with a phishing email and end up costing millions of dollars to the organizations.

Read More
news image

2019 Cyber Etiquette: A Guide To Today’s Top Cyber Threats

Infographic | December 20, 2019

The best detection and response solutions provide deep visibility to secure and investigate potential risk. Greater automation and contextualization of security events brings more informed decision-making, faster triage and effective remediation of threats.

Read More
news image

Social Engineering Attack Facts

Infographic | April 4, 2022

Social engineering attacks exploit human error to access credentials or spread malware using infected email attachments or links to malicious websites.43% of IT experts report that they have been victims of social engineering.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More

Spotlight

Concord

Concord helps big companies untangle their technology messes. More than just making promises, we are the doers who get results. We focus on four core capabilities: Digital & User Experience, Cloud Applications & Integration, Data Solutions & Analytics, and Information Security.

Events