Skip to content

Why You Must Enable Two-Factor Authentication in MDM

What is Two-Factor Authentication? If you’re among those whose entire business operates through Gmail or other online services, these accounts are your most prized possessions. That means securing them just by using a username and password is not enough; passwords are really easy to crack and log-in details can be compromised in minutes. For this…

Read More

Linux Lockdown Solution: A Better Alternative to Kernel Lockdown

Introduction Linux is a part of the Holy Trinity of global operating systems – one of the most popular technologies among developers around the world. As an open-source operating system, Linux powers most of the world’s powerful websites such as Google, YouTube, Facebook, Amazon, Zoom, and many more. Even stock markets and digital studios that…

Read More

4 common mobile device security threats enterprises face and ways to prevent them

Follow @42gears Growing mobility is changing the way Enterprise Information Technology departments work. Employees who are on the move have been quick to embrace mobile devices as productivity enhancing tools. These mobile devices are slowly replacing laptops and desktop computers and are being used by employees for all possible purposes that include getting in touch…

Read More

SureLock allow Bandim Health Project workers become more efficient by securing Android field tablets

Bandim Health Project is a health and demographic surveillance site in Guinea-Bissau and is formally placed under the National Institute of Public Health. BHP follows a population of more than 200,000 individuals in urban and rural Guinea-Bissau. This provides a unique platform for conducting health research. Health workers and research associates associated and working for…

Read More

How to know Android Applications Permissions

Android OS runs applications in separate sandboxes which means an application cannot directly access data or other resources belonging to another application. Rarely an application can do everything on its own. They usually need resources belonging to other applications installed on the system. Android provides additional capabilities to applications by means of “Permissions”. An application…

Read More

Single Most Effective Tip to Protect Smartphones

Mobile phones getting lost or stolen is a common occurrence. Almost 37% smartphone users have had this experience in the past. Loss of phone also means loss of privacy or critical business data which could cost more than the phone itself. People will continue to lose phones but fortunately there is a secret to make…

Read More

New security feature for android device management using SureMDM

SureMDM adds another compelling security feature for Android device management. IT administrators can now restrict users to access only approved applications. All other applications and system settings are password protected. This feature also blocks the user from installing any third-party applications. Using this feature is very simple. The installed application list of a device now…

Read More

Android and password policy enforcement using SureMDM

Enterprise use of Android devices is on the rise these days. Much of it is due to the availability of new security features (Android 2.2+) such as the ability to enforce password policies across Android devices and to remotely wipe any Android devices that are lost or compromised. Suppose all employees in your organization have…

Read More

Mobile device security threats you should know about

For most purposes smartphones today are almost as powerful as computers. There are now more phones in the world than the number of computers. Phones are being used by people to check emails, browse web, make online payments, download games, take pictures, track location and much more. Along with these powerful features we should also…

Read More

Understanding Windows Mobile Application Security Policies

Execution of programs on Windows Mobile devices depends on the application signatures and their permission levels. Devices can be configured to the following security settings. Security off Unsigned applications are allowed to run without any prompt and they can access privileged APIs, or protected areas of the registry and file system. One-tier prompt The device…

Read More