Mobile

483 days left

Share this post:

On May 25 2018 the European General Data Protection Regulation (GDPR) will take effect. But what do you actually know about the consequences it will have for your business? How will a potential vulnerability affect the enterprise with the implementation of GDPR?

The control of incoming and outgoing data traffic can have vulnerabilities, and so can all the different mobile devices such as laptops, tablets and smartphones that connect to the network. In a broader sense, vulnerabilities can also be due to human factors, such as carelessness, thoughtlessness and naivety combined with technology – technology that was not designed to compensate for such issues.

Make sure to be well-prepared for the GDPR: maybe now would be the time to start a project around GDPR and Enterprise Mobility Management?

You can read more about Mobile Malware here.

Please do not hesitate to contact me at +46-8-7936056 or by mail Thomas.Pelioglou@ie.ibm.com for advice – it is better to ask one too many times than one too few when it comes to corporate security.

Have a safe and secure continuation of the year!

Sales Specialist IBM MaaS360

More stories

IBM Security and any.cloud join forces to eliminate digital fraud

The future for digital trust has never been brighter In May, any.cloud launched ReTrust with the help of IBM. ReTrust is a service that combines security market leader IBM Trusteer with a highly cost-effective as-a-Service model making Trusteer available to any business. Making this service available to companies of any size makes it possible to […]

Continue reading

The Impact of IBM’s Groundbreaking Cyber Security Truck

As a result of the ubiquitous, increasing events of hacking and security breaches, IBM has sought to provide an opportunity for companies to develop protection plans, should they be intruded. Therefore, IBM created The X-Force Command Cyber Tactical Operations Center (C-TOC) to help counter such cyberattacks, which we made a blog post about in November 2018. […]

Continue reading

Cybersecurity doesn’t need more tools; it needs new rules.

Let’s be frank: Chief information security officers (CISOs) and security professionals all know cybersecurity complexity is a major challenge in today’s threat landscape. Other folks in the security industry know this too — although some don’t want to admit it. The problem is that amid increasing danger and a growing skills shortage, security teams are […]

Continue reading