Roxane Suau

Recent Posts

Actionable insights to secure remote workers

Posted by Roxane Suau on March 26, 2020

The pandemic situation requires governments to actively enjoin companies to set up remote working.

To keep up as much as possible with activities, enterprises are issuing additional corporate-owned devices or enabling BYOD usages multiplying access points to corporate data.

 

Read More

What Zero Trust means for mobile security?

Posted by Roxane Suau on March 16, 2020

The Zero Trust model, first identified by the research firm Forrester, is a security approach based on the principle of not trusting any network or data access request by default, even when it comes from inside the company perimeter. Zero Trust goes beyond the identity approach which focuses on only authenticating the user. It has emerged as the most reliable way for companies to keep away cyberthreats evolving within their distant and immediate environment.

 

Read More

Mobile security, what to expect from Android Enterprise?

Posted by Roxane Suau on March 10, 2020

The arising of Android 10 major release and consequently Android Enterprise brings plethora of questions around how to manage and secure Android devices.

If Android Enterprise smoothen the administration of devices, it does not add a structuring piece to UEM security.

This article aims at clarifying the ins and outs underlying Android Enterprise and what are the key security steps to be implemented to ensure Android devices security.

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on March 05, 2020

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 76% of them use mobile applications, 8% exploit the OS and 16% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More

SMS OTP Authentication: Not As Safe As You May Think

Posted by Roxane Suau on February 17, 2020

Most online transactions require a two-step authentication, and the One-Time-Password (OTP) sent by SMS is often one of those two steps. The purpose of an OTP is to prevent fraud by confirming that the person making the transaction and the credit card owner are one and the same. To do so, a temporary code is automatically sent by SMS to the phone number associated with the bank account used.

 

Read More