Cyber security news for all


    Safe IT security infrastructure for mobile device management

    Employees have clear ideas about their future job. But the desire for it is not enough. The technical requirements must be done by the IT infrastructure.

    Employees wishes and expectations of a modern workplace are on the one hand, IT is on the other and the question arises: Is the IT infrastructure well and securely set up? The provision and implementation of a modern workplace is not easy for companies. The availability of innovative hardware and software applications alone is not enough. For safe and mobile work, the IT infrastructure must set the course and create the appropriate conditions.

    Mobility Is A Central Concern

    This is borne out by the results of the employee surveys around the world. However, the increase in mobile devices and the integration of these devices in their own company network still poses major challenges for IT managers. If mobile devices are unprotected, potential attackers quickly take advantage of these vulnerabilities. It is essential for companies to use mobile device management or unified endpoint management to centrally manage and secure mobile endpoints. So far, solutions for securing mobile devices have only played an important role for almost half of the companies.

    The Modernization Of IT Security Infrastructure

    In order to create a bridge between the requirements of the employees in a modern workplace and the possibilities of implementation through the company’s IT, a clear objective is required. 75 percent of those responsible for IT want to equip all workplaces with the latest IT technologies in 5 years. However, the modernization of the IT infrastructure must not be arbitrary, but must consistently follow a fixed, targeted plan to ensure successful completion. So far, just under a quarter of those surveyed have followed such a roadmap. Another 25 percent have defined a roadmap, but implementation is still lacking. A roadmap is in the planning phase or in the development phase and less IT managers surveyed have no idea yet.

    Recent Articles

    Hackers stole thousands of passport data in Argentina

    In response to millions of dollars ransom refused by the Argentine Immigration Service, a ransomware group released passport data from hundreds of thousands of...

    USA wants to improve cybersecurity of space systems

    CISA has published a table this week that summarizes Chinese activities against cybersecurity. Some attacks have succeeded and enabled hackers to gain a foothold...

    Unknown attackers had access to personal data of Warner Music

    Warner Music Group has admitted a security incident in which customers card details were stolen in some of the company's online stores. Warner Music...

    Donald Trump wants to force a sale of TikTok to Microsoft

    It was recently announced that President Donald Trump plans to prohibit business with the owners of TikTok by decree. The American head of state...

    PIN protection is cracked for contactless payments

    Contactless payments by card only works up to typically 30 dollars without a PIN. The PIN is actually  requested for high payments. This is...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox