Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Are Your Smartphone Apps Leaking Personal Information? For many years now, we have been trained to look for the SSL icon on our browsers, and have told our family and friends to do the same. It’s a basic security measure that ensures our traffic cannot be intercepted and spied on. The last thing we want when doing online banking, reading our email or shopping online is having someone sitting there and watching our every move, [...]

By | March 13th, 2013
Industry InSights, IT Infrastructure|Comments Off on Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Mobile Menace: Trends in Mobile Threats Infographic

By | August 11th, 2011
IT Infrastructure|Comments Off on Mobile Menace: Trends in Mobile Threats Infographic

6 Sure-Fire Ways to Increase Mobile Security

6 Sure-fire Ways to Increase Mobile Security Mobile threats have risen by more than eight times over the past five years, with a sharp increase in 2010. After some 200,000 users downloaded infected mobile apps from the official app store Android Market, Google pulled more than 50 infected programs from the Market. In an effort to protect information on mobile devices, IT managers are increasingly becoming aware of the need to not only apply security [...]

By | March 26th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on 6 Sure-Fire Ways to Increase Mobile Security

Top Tech Threats & Trends for 2011

Twitter |  Facebook |  LinkedIn Top Tech Threats & Trends for 2011 Here at InfoSight, Inc. we have put together our take on what the key tech trends and threats of 2011 will be. We know as the technologies become faster and smarter so will the threats that follow them. The Social Engineering and Black Hat SEO we experienced in the previous year will still hold strong and continue to transform, and we’ll see a [...]

By | March 26th, 2011
IT Infrastructure|Comments Off on Top Tech Threats & Trends for 2011

Managed Firewall 101: What Everyone Needs to Know

If your home has ever been burglarized, you know what it feels like to be victimized. You may have been temporarily aggravated or even angered by the “inconveniences” that followed the event, i.e., repairing a broken window or door, changing the locks, installing an alarm system, replacing items that were stolen, wondering what else was stolen that you haven’t noticed yet, etc., and somehow, the feeling of just how vulnerable you are stayed with you [...]

By | March 22nd, 2011
IT Infrastructure|Comments Off on Managed Firewall 101: What Everyone Needs to Know

Don’t Let Development Pressures Cut Security Testing Short

Don't let development pressures cut security testing short. There are more than 5,000 known security vulnerabilities and the number is growing.  In 2008, there were 11.5% more internet security vulnerabilities disclosed than in 2007. That's because we're getting better at identifying and eliminating vulnerabilities. But all the progress made can be thrown out the window, if you're in a hurry to roll out the latest and greatest software upgrade. There are a lot of reasons [...]

By | March 3rd, 2011
IT Infrastructure|Comments Off on Don’t Let Development Pressures Cut Security Testing Short