After being recognized by Gartner as a leader in seven consecutive Magic Quadrants for Mobile Data Protection, we continue our success by being one of the vendors with the most comprehensive solution in the new Gartner report, Market Guide for Information-Centric Endpoint and Mobile Protection.*
This new report by John Girard of Gartner is the replacement for the now retired Gartner Magic Quadrant for Mobile Data Protection. It defines nine different methods for information-centric endpoint protection, ranging from basic device protection to comprehensive file-based protection methods.
Apple has made iOS 10 available and will push upgrade notifications out to devices over the next few days. Some early adopters even have iOS 10 already installed!
Good news – Sophos Mobile Control is ready with same-day support of iOS 10. Once iOS 10 is loaded onto your users’ devices, it’ll be supported by all components of Sophos Mobile Control.
For a comprehensive list of iOS 10 features, please visit Apple’s iOS product page. Another good source of information about iOS 10 and the newly-announced Apple gadgets is Digg.com’s live blog from Apple’s recent iPhone 7 keynote.
As a security vendor, we’re often asked, “What about Sophos Antivirus for iPhones and iPads?”
We’d love to oblige, but Apple’s iOS development model doesn’t allow the sort of interaction with the operating system that we’d need to build an effective anti-virus program.
In particular, to qualify for the App Store, an app is limited to its own sandbox, where it isn’t supposed to be able to read or interfere with other apps, or to sidestep Apple’s commercial controls.
That makes it impossible for an anti-virus to analyse other apps, or to hook into the operating system itself to scan files after they are downloaded but before they are used.
In other words, even trusted vendors can’t publish apps that do what you’d expect from an anti-virus – not unless you jailbreak your phone, which opens up a whole heap of security risks on its own.
The silver lining, however, is that Apple’s strict walled garden approach has made it much harder to sneak malware onto iPhones and iPads, so Apple devices have experienced a minuscule fraction of the malware troubles that have beset the Android ecosystem.
Of course, no walled garden is perfectly secure against attackers, and Apple regularly issues iOS updates to close off software vulnerabilities to help keep the bad guys out.
This means that keeping your device up-to-date with the latest iOS version is an important part of staying secure.
Today, every business is mobile. Across enterprises of all sizes, everyone from entrepreneurs and executives to knowledge workers needs to get online and access business data and files using smartphones, laptops and tablets.
Employees using their personal devices to access corporate applications and data can put their organizations at risk when they lose or misuse their devices. In addition, cybercriminals are capitalizing on these trends by building mobile malware to infiltrate networks and steal data. Mobile risk is on the rise.
For IT security teams, this new reality creates a daunting challenge. You must manage this increased risk while at the same time empowering users and respecting their privacy.
In order to help you meet this challenge, Sophos has created a new guide to setting priorities that allow you to provide flexibility, but also protect your networks and corporate data. Our free whitepaper 3 Steps to Securing the Mobile Workforce lays out a simple approach for organizations to successfully secure their mobile workforce.
Sophos security expert James Lyne spoke during a keynote session on the Internet of Things at this year’s edition of Mobile World Congress, sharing a sampling of his research on the startling security immaturity of IoT devices.
Although James says he’s a big proponent of the IoT, of mobile applications, and the possibilities these technologies bring, his research shows how a number of them fail even the most basic security tests.
According to James, many of today’s IoT devices make it too easy for malicious hackers. James has seen massive security failures such as devices with hardcoded passwords, some exposed to vulnerabilities that should have been patched long ago, and others communicating across the open Internet unencrypted.
You can watch James’s brief but entertaining talk in the video embedded below. He explains his discoveries and shares his insights into how and why IoT and mobile security went so wrong, and what we can do to get it right.
Healthcare organizations transmit and store huge amounts of sensitive information, but health data continues to leak out accidentally, or as a result of cyberattacks, at an alarming rate.
In the United States, enforcement of the law known as the Health Insurance Portability and Accountability Act (HIPAA) of 1996 is intended to safeguard the confidentiality of protected health information (PHI). HIPAA was updated in 2009 under the HITECH Act, focused on penalties and rules around disclosure in the event of a PHI breach.
The consequences of a PHI breach can be severe for impacted organizations. If a breach occurs and the data is not encrypted, organizations may be required to notify all individuals concerned, and may incur fines that can exceed $1 million.
If you’re a US-based healthcare organization concerned about HIPAA compliance, we can help. Use our HIPAA compliance check tool to answer six questions that help you identify where you need to improve your data security. It only takes a minute and you don’t have to sign up – it’s free!
The Internet of Things (or IoT for short) is rapidly expanding to include an unprecedented number of connected devices. All the smart things coming online need to be secured, but sadly, security seems to be low on the list of priorities for IoT manufacturers and developers.
There’s a very broad array of consumer and industrial applications for the IoT: wearables, TVs, thermostats, lighting, security cameras, drug infusion pumps, electricity meters, toys, cars, and much more. What can be done to make sure our devices are safe from snoops and hackers?
James Lyne, Sophos global head of security research, addresses this important issue during a keynote session at Mobile World Congress, taking place the week of 22-25 February.