Privoro

Corporate espionage has gone mobile and gotten personal.

Posted by Nik Souris on Jun 6, 2018 4:11:00 PM

Economic espionage – also known as industrial espionage, corporate espionage and corporate spying – justifiably resides as the top concern of security professionals and persists across companies of all sizes. Whether a company’s knowledge assets or data on its personnel, the odds have long been that someone seeks proprietary information.Today, however, the information is more accessible, exists in various locations and available to devices via the internet. What has also changed is the migration of access to data as it no longer occurs for everyone from a computer terminal in an office. Data now resides in the cloud and may possibly be distributed across a myriad of electronic devices. Moreover, the adoption of mobile computing combined with the explosion of electronic devices has forged a Bring Your Own Device (BYOB) work model that has essentially extended the enterprise’s security perimeter to each employee’s phone providing assailants a greater surface to attack with an easier entrée given the vulnerabilities with smartphones. These devices that have more computing power than what powered a business 40 years ago have but a fraction of the protections. The abilities to access corporate systems, intercept inter-company correspondence, eavesdrop on sensitive conversations, track employees and store precious data now reside on smartphones and reside in nearly every employee’s hand with the first and often only guard of protection to something an enterprise values.

Read More

Topics: Mobile Security, Mobile Espionage, Data Privacy, Cybersecurity, Smartphone Security, Corporate Espionage, Enterprise

Privoro says RIP to passwords and hello to better security on #PasswordDay.

Posted by Nik Souris on May 3, 2018 1:54:15 PM

As the internet uses #PasswordDay to celebrate and patronize the 1961 Massachusetts Institute of Technology creation of the password, we at Privoro are working on our goal of ending the use of passwords within our organization.

Read More

Topics: Mobile Security, Cybersecurity, CFMA, Password Day, password, passwordless

Blocking smartphone cameras is easy. Protecting microphones is hard. Here’s why.

Posted by Blake Kotiza on Apr 16, 2018 12:00:00 PM

BlockingCamerasMicrophonesBlogImageOver the last couple of years I’ve become much more security- and privacy-focused. Why?

Read More

Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security

Cybersecurity tips. Part 3: Digital hygiene.

Posted by Matt Shaheen on Apr 5, 2018 9:36:33 AM

This is the third installment of a three-part series on cybersecurity advice. In part 1, I covered general awareness and protection of personal devices. In part 2, I covered ways to protect yourself in online interactions. In this third and final post, I will focus on ways to practice good digital hygiene such as backing up data, managing passwords, keeping data clean and managing your social media information.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Computer Security, Smartphone Security, Cyber Hygiene

Cybersecurity tips. Part 2: Online behavior.

Posted by Matt Shaheen on Mar 21, 2018 8:30:00 AM

This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered general awareness and protection of personal devices. In this post, I will focus on online interactions and provide advice to help ensure you are safe, secure and private in the online world.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Computer Security, Smartphone Security, Online Behavior

Cybersecurity tips. Part 1: Awareness.

Posted by Matt Shaheen on Mar 5, 2018 6:30:00 AM

When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line dial-up modem and a beeper. For years, the computer was the only device I connected to the corporate network. The computer was provisioned to me complete with corporate standard software and all of the necessary security controls built in. The software was kept up to date by my IT department and the only things I had to do were keep the device physically safe from thieves and avoid losing it. Fast forward to today and things look much different. With the emergence of BYOD (Bring Your Own Device), more personal machines are connecting to the private networks of organizations without the oversight of IT. The presence of these devices increase the risk of exploitation from the outside. Chief Information Security Officers (CISOs), who are responsible for securing enterprise networks, face challenges with this new paradigm. The days of relying on the IT department to handle everyone’s cybersecurity needs are gone. It has become imperative for all of us to take a more active role in maintaining the right cybersecurity measures for ourselves. By paying attention and doing work to set things up properly, you can keep yourself and your livelihood safe. After all, like a chain with several links, your corporate security is only as strong as its weakest link. Do you want to be the weak link?   

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Computer Security, Smartphone Security

Protecting your smartphone from fake cell towers.

Posted by Blake Kotiza on Feb 5, 2018 10:17:28 AM

The first time I heard about “Fake Cell Towers”, I thought to myself, Hold up. There is such a thing as a “fake” cell tower?!? Why would someone want or use a fake cell tower?

Read More

Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security, fake cell towers

Data Privacy Day 2018: How safe is your personal information?

Posted by Nik Souris on Jan 26, 2018 8:00:00 AM

Personally Identifiable Information, commonly referred to as PII, can be broadly defined as any data that could potentially identify a specific individual. Additionally, it may include any information that can de-anonymize a person from other persons or a set of anonymous data.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy Day, CFMA

CES 2018: Voice assistants and data collection.

Posted by Julie Dexter Berg on Jan 15, 2018 8:08:00 AM

CES, that mind-boggling and exhausting annual tribute to tech innovations has changed. More than 25 years ago the event was dominated by the wireless players and Microsoft with a wink and a nod to Detroit. Over time the show has shifted from the pinnacle venue for tech companies to unveil their splashy new consumer products to the place to experience nascent technologies.

Read More

Topics: CES, Artificial Intelligence, Smartphone Security, Data in Vicinity

Prevent apps from spying on your phone.

Posted by Laurie Richmond on Jan 12, 2018 11:42:30 AM

How many of us have shared secrets, disciplined our children, sought council on how to address a work or family issue, discussed sensitive financial challenges or had a private moment with our children or loved ones in the presence of our smartphones? Most of us? All of us? These are common occurrences in our daily lives which typically happen behind closed doors due to the sensitive nature of the information being discussed or the actions occurring. People say, “you never know what goes on behind closed doors”, until now.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Mobile Tracking, Data Privacy, Data in Vicinity

At Privoro, we’re rethinking mobile security to empower you to participate in our hyper-connected, data-driven world without giving up control of your personal information. Stay tuned to our blog to learn about the big problems we’re solving and why we’re using mobile security hardware systems to solve them.

Subscribe Here!

Recent Posts