https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


Security threats to smart phones jump in 2010

Security threats to smart phones jump in 2010

IT staffs are becoming increasingly challenged as more enterprise workers use their personal devices in the workplace.
  • Written by Urgent Communications Administrator
  • 15th December 2010

Security firm AdaptiveMobile revealed that 2010 saw the highest number of mobile malware infections aimed at smart-phone users. Reports of such incidents were up 33% from 2009.

Not surprisingly, malware created just for the Google Android mobile platform — the fastest-growing platform throughout 2010 — increased four-fold in the number of exploits. However, the total number of exploits remains lower than its older platform counterparts. Smart phones running Java-based applications saw the second-highest increase in malware reports, up 45% from 2009.

AdaptiveMobile concludes that cyber criminals are shifting their focus toward the technologies and platforms that likely are to see the most widespread adoption going forward.

Certainly smartphone security is a key issue for the enterprise, and 2011 could represent a difficult year as that sector embraces more than just e-mail on smart phones. Mobile applications are coming to the forefront and so are employee-owned devices that want to access both corporate applications and less secure applications such as social networking.

Ojas Rege, vice president of products and marketing with mobile device management company MobileIron, said that 2011 will be marked by the enterprise moving beyond mobile e-mail and calendaring to a focus on mobile productivity and corporate applications. He said about half of its customers have plans for applications in 2011.

“The iPad has been a catalyst,” he said.

MobileIron’s solution is to deliver an “enterprise app storefront” for several smart-phone platforms, combined with a policy engine to ensure that mobile applications are secure. It enables an enterprise’s IT staff to approve the apps, set policy and push them to end users. Moreover, IT can decide which apps to allow and which ones to keep out by blocking rogue apps that might create security holes or violate acceptable-use policies.

Indeed, the line between personal and corporate use will be an issue many vendors will tackle in 2011. VMware and smart-phone vendor LG have formed a partnership to build smart phones that will include a separate corporate identity and e-mail account that is distinct from a user’s personal account using VMware’s virtualization software.

That means the screen on the devices will show up as just another application, but the application is its own secure corporate entity that includes corporate functions such as e-mail.
Those phones are expected to come to the U.S. market in the first or second quarter of 2011.

At any rate, IT will be challenged in 2011 to meet the demands of their workers while keeping their corporations safe from threats posed by smart phones.

What do you think? Tell us in the comment box below.

Tags: Call Center/Command content

Most Recent


  • FBI, CISA issue joint warning on 'Snatch' ransomware-as-a-service
    Cybersecurity advisories from the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) are usually a good indication that a particular threat merits priority attention from organizations in the crosshairs. That would appear to be the case with “Snatch,” a ransomware-as-a-service (RaaS) operation that has been active since at least 2018 and is the […]
  • Huawei hacked by U.S., according to China spy agency
    It’s back to 2019 on Huawei, with the US and China exchanging barbs and the Chinese firm accused of skirting US export rules. China foreign affairs spokesperson Mao Ning Wednesday assailed the US for “overstretching” the concept of national security in order to discriminate against Chinese companies. She rejected a complaint by Commerce Secretary Gina Raimondo over […]
  • Driverless-car crashes less frequent, cause less damage, according to insurance research
    Waymo is using insurance data to demonstrate that its self-driving taxis are safer than human-driven vehicles. The company, owned by Google parent Alphabet, has published research led by insurer Swiss Re that it says shows how driverless vehicles crash less frequently and do less damage than those piloted by humans. The study comes at a pivotal moment […]
  • Germany proposes strict curbs on Huawei
    Relying on a Russian thug for energy supplies no longer appeared very sensible to Germany’s government after Vladimir Putin sent Russian troops into Ukraine. Similar dependence by Germany’s telcos on Huawei has looked just as risky to opponents of the Chinese equipment vendor. If Putin could turn off the Nordstream gas taps in response to […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Open-source tools for the IoT ecosystem
  • New Orleans-area 911 center inks multiyear APEX deal with Carbyne to replace call-handling system
  • Security threats to smart phones jump in 2010
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race

Commentary


Better technology can help solve the public-safety staffing crisis

26th June 2023

Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.