{"id":26599,"date":"2018-09-21T06:33:28","date_gmt":"2018-09-21T06:33:28","guid":{"rendered":"http:\/\/live-42gears-site.pantheonsite.io\/?p=26599\/"},"modified":"2020-11-09T13:38:43","modified_gmt":"2020-11-09T13:38:43","slug":"major-mobile-threats-that-cause-data-breaches","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/pt-br\/blog\/major-mobile-threats-that-cause-data-breaches\/","title":{"rendered":"Major Mobile Security Threats That Cause Data Breaches"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone wp-image-26605\" src=\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2018\/09\/Major-Mobile-Threats-That-Can-Cause-Data-Breaches-Banner.png\" alt=\"Major Mobile Threats That Can Cause Data Breaches Banner\" width=\"774\" height=\"302\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Major-Mobile-Threats-That-Can-Cause-Data-Breaches-Banner.png 1000w, https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Major-Mobile-Threats-That-Can-Cause-Data-Breaches-Banner-300x117.png 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Major-Mobile-Threats-That-Can-Cause-Data-Breaches-Banner-768x300.png 768w\" sizes=\"(max-width: 774px) 100vw, 774px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Smartphones are making lives easier by being our constant digital companions. They also serve a significant role as an enterprise computer substitute. However, increased usage of smart devices and applications has led to a rapid increase in mobile security threats and data breaches. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, &nbsp;enterprises consider mobile malware as one of the top security concerns. Malware and virus threats acquired from mobile use might have seemed unlikely a decade ago. But fast forward to 2018, and incidents of mobile malware have skyrocketed to millions.. The threat level of malware specifically targeting mobile devices, such as <em>Gooligan<\/em> and <em>Hummingbad<\/em>, are only the tip of the iceberg. A survey conducted by <strong>McAfee Labs<\/strong> states, more than <strong>16 million mobile malware incidents<\/strong> were registered in the third quarter of <strong>2017<\/strong>, nearly doubling in number from the year before.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In any workplace, <em>iOS<\/em> and <em>Android<\/em> are considered the most robust and secure operating systems. However, they too face threats from malicious malware that continue to become more serious and deceptive with time. Weak encryption during app development combined with ubiquity of mobile devices used in the workplace due to adoption of BYOD create the perfect conditions for mobile attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cost of data breaches for enterprises can be very high since information that\u2019s held on business devices can include sensitive information such as customer info, contracts, competitive data, intellectual property details and sometimes financial data. Also, data breaches can leave corporate networks open to other potential threats. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the biggest threats that have been identified to affect mobile device security in a business ecosystem:<\/span><\/p>\n<p><b>1. Enterprise-class Malware (Spyware specially targeting enterprises) <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Employee-personal devices are usually in close proximity to corporate network access, company\u2019s GPS tracking and other services. This proximity is specifically targeted by hackers that look for ways to infect mobile devices with spyware. An example could be the Pegasus spyware released in 2016, that hacked iPads and iPhones to harvest sensitive data. This was succeeded by iOS zero-day vulnerabilities that were discovered by malware actors to form an attack chain. In 2017, a Pegasus spyware version for Android was launched that secretly gained root access to a device by acting as a normal app download. Since then Apple and Google have bolstered their security measures. <\/span><\/p>\n<p><b>2. Mobile Botnets<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Mobile botnets pose a serious threat to mobile security. They provide hackers control over devices without the knowledge of their owners. Viking Horde was the first mobile botnet that targeted Android devices. It created a botnet on rooted as well as non-rooted devices to generate revenue for the attacker by using proxied IP addresses to disguise as ad clicks. In 2016, the Hummingbad mobile botnet infected over 10 Million Android operating systems and generated fraudulent advertising revenue for hackers by tapping on advertisements without the user&#8217;s knowledge. Though initially this malware was used for adware purposes, they are increasingly being used to open back doors on infected devices, with the intention of stealing sensitive data. With mobile devices being the most used devices by individuals, botnet owners usually find 24\/7 access to several potential zombie bots.<\/span><\/p>\n<p><b>3. Phishing Attacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Phishing is one of the most common ways of targeting computers and mobile devices to obtain secure information. Hackers use this method to corrupt devices by pushing malware through malicious links that can be transmitted via electronic communications or using the internet. Ad and click frauds are the most common form of phishing attacks. These types of frauds compromise the security of mobile devices and provide hackers access to the internal network of an organization. Hackers use techniques such as getting an employee to click on the link of a malicious app or by sending an SMS phish. Once hackers get control over a device, they can steal an employee\u2019s credentials and gain access to the company\u2019s internal network.<\/span><\/p>\n<p><b>4. Unwanted or Dead Apps<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Apps that are no longer supported in the Google PlayStore or Apple Appstore pose a threat to companies. Employees should be encouraged to periodically check the status of mobile apps on their devices in order to update or delete them. Even though both Google and Apple remove a number apps from their stores; &nbsp;usually due to malware, copyright or data leakage issues; it is up to companies to ensure that their employees are using only necessary apps on their corporate devices. <\/span><\/p>\n<p><b>5. IoT Devices<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Malware specifically targeting Internet of Things (IoT) is still in its infancy stage. However, that hasn\u2019t stopped malware authors from moving into the IoT arena. What interests hackers is the fact that IoT devices are largely connected and configured by smart phones and other smart devices. Also, there is minimal security effort that is implemented to counter these attacks on IoT devices. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though companies have to instill user behavior awareness in their employees, they should also continue to work towards reducing risk of mobile threats through encryption and visibility on all devices that access the corporate network.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"http:\/\/live-42gears-site.pantheonsite.io\/solutions\/unified-endpoint-management-uem-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">42Gears UEM solution<\/a> ensures that strict policy protocols are implemented on business-use devices in order to minimize mobile threats that can cause data breaches. 42Gears BYOD solution specifically caters to employee devices by creating separate work containers in order to monitor access to corporate emails and applications. These containers and can be governed by security policies such as the inability to copy data or download unallowed applications. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Company-owned devices that connect to corporate networks can be managed using 42Gears UEM to ensure safe data transfer. Businesses can schedule regular scans of all installed applications on company devices to ensure they are up-to-date and also remove unwanted applications from the devices. 42Gears UEM also offers Mobile Threat Detection that can list out harmful applications featuring malicious malware or virus so that they can be deleted quickly. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keep your corporate devices protected against mobile security threats using 42Gears UEM. <\/span><a href=\"https:\/\/suremdm.42gears.com\/console\/?registration=true&amp;uem=true\"><span style=\"font-weight: 400;\">Sign up<\/span><\/a><span style=\"font-weight: 400;\"> for a free trial today. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphones are making lives easier by being our constant digital companions. They also serve a significant role as an enterprise computer substitute. However, increased usage of smart devices and applications has led to a rapid increase in mobile security threats and data breaches. Today, &nbsp;enterprises consider mobile malware as one of the top security concerns.&hellip;<\/p>\n","protected":false},"author":7,"featured_media":26606,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10,23,8,398,399],"tags":[28,368,361],"class_list":["post-26599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-enterprise-mobility","category-general","category-uem","category-unified-endpoint-management","tag-enterprise-mobility","tag-mobile-security","tag-uem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data breaches - Five major risks and how to stay safe<\/title>\n<meta name=\"description\" content=\"Data breaches stop enterprises in their tracks. Keep your business going strong by looking out for these threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Major Mobile Security Threats That Cause Data Breaches\" \/>\n<meta property=\"og:description\" content=\"Data breaches stop enterprises in their tracks. Keep your business going strong by looking out for these threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-21T06:33:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-09T13:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png\" \/>\n\t<meta property=\"og:image:width\" content=\"499\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"Major Mobile Security Threats That Cause Data Breaches\",\"datePublished\":\"2018-09-21T06:33:28+00:00\",\"dateModified\":\"2020-11-09T13:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\"},\"wordCount\":981,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png\",\"keywords\":[\"Enterprise Mobility\",\"mobile security\",\"UEM\"],\"articleSection\":[\"Business\",\"Enterprise Mobility\",\"General\",\"UEM\",\"Unified Endpoint Management\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\",\"name\":\"Data breaches - Five major risks and how to stay safe\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png\",\"datePublished\":\"2018-09-21T06:33:28+00:00\",\"dateModified\":\"2020-11-09T13:38:43+00:00\",\"description\":\"Data breaches stop enterprises in their tracks. Keep your business going strong by looking out for these threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png\",\"width\":499,\"height\":330,\"caption\":\"Mobile Device Security Threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Major Mobile Security Threats That Cause Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data breaches - Five major risks and how to stay safe","description":"Data breaches stop enterprises in their tracks. Keep your business going strong by looking out for these threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/","og_locale":"pt_BR","og_type":"article","og_title":"Major Mobile Security Threats That Cause Data Breaches","og_description":"Data breaches stop enterprises in their tracks. Keep your business going strong by looking out for these threats.","og_url":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2018-09-21T06:33:28+00:00","article_modified_time":"2020-11-09T13:38:43+00:00","og_image":[{"width":499,"height":330,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png","type":"image\/png"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"Major Mobile Security Threats That Cause Data Breaches","datePublished":"2018-09-21T06:33:28+00:00","dateModified":"2020-11-09T13:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/"},"wordCount":981,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png","keywords":["Enterprise Mobility","mobile security","UEM"],"articleSection":["Business","Enterprise Mobility","General","UEM","Unified Endpoint Management"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/","url":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/","name":"Data breaches - Five major risks and how to stay safe","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png","datePublished":"2018-09-21T06:33:28+00:00","dateModified":"2020-11-09T13:38:43+00:00","description":"Data breaches stop enterprises in their tracks. Keep your business going strong by looking out for these threats.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png","width":499,"height":330,"caption":"Mobile Device Security Threats"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/major-mobile-threats-that-cause-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Major Mobile Security Threats That Cause Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/09\/Featured-Image-Major-Mobile-Threats-That-Can-Cause-Data-Breaches.png","_links":{"self":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/26599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/comments?post=26599"}],"version-history":[{"count":4,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/26599\/revisions"}],"predecessor-version":[{"id":59433,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/26599\/revisions\/59433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media\/26606"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media?parent=26599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/categories?post=26599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/tags?post=26599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}