Why You Should Care About Mobile Security

The BYOD revolution. You've heard of it, you know it's coming, some believe it's already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!.With BYOD, IoT, Mobile Banking and M-commerce trending worldwide, the need for mobile security becomes much more critical. Today we bring you facts as to why you should start caring about mobile security.

Spotlight

Recon InfoSec

Information Security is who we are and all we do. Our team is unique. We are the believers that volunteer and run CTFs at BSides, DEF CON, and other security conferences. We are infosec specialists with a broad spectrum of complementary skills. We are developers, security analysts, and forensic investigators.

Other Infographics
news image

2017 Consumer Mobile Security App Use

Infographic | March 25, 2018

Keeper mobile survey finds security awareness is high, but use of security apps is lagging. Users approach security in a similar way as they do on their desktop computers. This can be a problem, given the unique vulnerability of a smartphone - the small computer that fits in your pocket. Today, nearly 2.3 billion people use a smartphone. Keeper conducted a detailed survey of 1,000 smartphone users to determine how they protect their devices and sensitive data. Our findings indicated that password reuse across different applications is frequent, average password strength for mobile applications and websites is low and that most users rarely changed passwords.

Read More
news image

The Anatomy of a CISO: A breakdown of today’s top security leaders

Infographic |

What does the typical Fortune 100 CISO look like? We researched the top security leaders at F100 companies to get a better idea – here’s what we found.

Read More
news image

SECURITY AND YOUR BUSINESS

Infographic | November 23, 2018

49% of CEOs surveyed said that a cyber-attack is now a case of ‘when’ instead of ‘if’. 76% of security breaches are financially motivated which include cryptocurrency demands. 60% of small and medium-sized businesses say attacks are becoming more severe and more sophisticated. $2,235,000 in average costs for small and medium-sized businesses were due to damage caused by cyber-attacks in 2017.

Read More
news image

Why the US Needs More Cyber Security Professionals.

Infographic |

Well, fast forward a few months, and a new infographic from Norwich University is not merely confirming the severity of this security skills shortage across the US, but almost makes finding an actual unicorn seem like a pretty safe bet by comparison.

Read More
news image

Cybersecurity of network-connected medical devices in (EMEA) Hospitals 2016

Infographic | June 15, 2016

Cybersecurity of network-connected medical devices in (EMEA) Hospitals 2016. Next steps. Secure. Hospitals could work together to demand and increase cybersecurity in medical devices; in effect, therefore, asking for security and privacy by design. Vigilant. As with basic hygiene, cybersecurity is everyone’s business. Continual awareness of the link between cybersecurity and the safety of medical devices is, therefore, vital. Resilient. Monitoring of solutions to improve cyber vigilance,[13] combined with. incident response to increase resiliency.

Read More
news image

DDoS an increasing concern for majority in 2017

Infographic | March 23, 2017

Corero made an infographic from a poll of technology decision makers and security experts at the 2017 RSA Security Conference. From the study, they determined: 56% of respondents view DDoS as more of a concern in 2017 than it has been in the past.

Read More

Spotlight

Recon InfoSec

Information Security is who we are and all we do. Our team is unique. We are the believers that volunteer and run CTFs at BSides, DEF CON, and other security conferences. We are infosec specialists with a broad spectrum of complementary skills. We are developers, security analysts, and forensic investigators.

Events