{"id":48527,"date":"2021-05-06T19:16:29","date_gmt":"2021-05-06T19:16:29","guid":{"rendered":"https:\/\/www.42gears.com\/?p=48527"},"modified":"2024-12-30T12:52:04","modified_gmt":"2024-12-30T12:52:04","slug":"5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/pt-br\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/","title":{"rendered":"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/5-Device-Security-Flaws-Every-CTO-Must-Be-Prepared-To-Deal-With-In-2021_image.png\"><img decoding=\"async\" width=\"1000\" height=\"278\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/5-Device-Security-Flaws-Every-CTO-Must-Be-Prepared-To-Deal-With-In-2021_image.png\" alt=\"\" class=\"wp-image-71635\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/5-Device-Security-Flaws-Every-CTO-Must-Be-Prepared-To-Deal-With-In-2021_image.png 1000w, https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/5-Device-Security-Flaws-Every-CTO-Must-Be-Prepared-To-Deal-With-In-2021_image-300x83.png 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/5-Device-Security-Flaws-Every-CTO-Must-Be-Prepared-To-Deal-With-In-2021_image-768x214.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p style=\"text-align:justify;\">Any responsible CTO would want their company\u2019s devices to be free of flaws- but the only way to avoid having to deal with device security flaws in 2021 would be to simply not have any devices at all. No matter how much you try, there\u2019s no way to completely prepare in advance for what <strong>device security flaws<\/strong> become targets in 2021.&nbsp;<\/p>\n\n\n\n<p style=\"text-align:justify;\">This is to say that you need to put a wide range of defenses in place to protect your devices; this way, no matter what becomes&nbsp; a threat to your organization, you will have countermeasures ready. Reading this article will be a great start in knowing what threats are currently major issues.  <\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>Pre-Installed Malware on Android devices<\/strong><\/h2>\n\n\n\n<p style=\"text-align:justify;\">Many device security flaws surface on older devices, but it\u2019s alarming to think that a major threat could emerge right at the moment you receive a device- and that such a threat would be impossible to remove.&nbsp;<\/p>\n\n\n\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><i>\nAccording to MalwareByte\u2019s 2020 State of Malware Report, privacy-violating malware has come pre-installed out-of-the-box on an increasing number of smart devices. \n<\/i><\/p>\n<\/div>\n\n\n\n<p style=\"text-align:justify;\">According to MalwareByte\u2019s <em>2020 State of Malware Report<\/em>, privacy-violating malware has come pre-installed out-of-the-box on an increasing number of smart devices. Malicious actors convince <a href=\"https:\/\/www.cnet.com\/news\/android-malware-that-comes-preinstalled-are-a-massive-threat\/\">smart device manufacturers<\/a> to include their apps by default on their devices, when those apps are in fact malware. Worse, these apps may be essential to the device functioning properly, meaning the device security flaws they bring cannot be removed or neutralized without the help of the manufacturer.  <\/p>\n\n\n\n<p style=\"text-align:justify;\">This is most likely to occur on budget devices, whose manufacturers use third-party applications rather than developing applications in-house. This trend has gone so far as to impact devices <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\" target=\"_blank\">subsidized by the US government<\/a> for low-income citizens. Manufacturers can address these device security flaws after-the-fact, but for millions of Android device users, the damage will already have been done.&nbsp;<\/p>\n\n\n\n<h3 style=\"font-size:16px;\">How to Prepare<\/h3>\n\n\n\n<p style=\"text-align:justify;\">The most obvious safeguard against pre-installed malware is researching device purchases extensively in advance. In particular, if a device\u2019s core applications (such as settings and software update software) belong to a third party, you should carefully scrutinize the security of those applications.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>\u201cWatering hole\u201d exploits and government malware on Apple devices<\/strong><\/h2>\n\n\n\n<p style=\"text-align:justify;\">For many years, proponents of Apple\u2019s iOS devices have lauded the operating system\u2019s airtight security. This reputation came under fire in 2019, after a series of high-profile security breaches exposed iOS device security flaws. Together, they ensure that both malicious agents and digital safety experts will focus on iOS devices for much of 2021.&nbsp;<\/p>\n\n\n\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><i>\nIn mid-2019, a group of websites found a way to install malware on iPhones that accessed those sites (known as \u201c<b>watering holes<\/b>\u201d).  \n<\/i><\/p>\n<\/div>\n\n\n\n<p style=\"text-align:justify;\">First, in mid-2019, a group of websites <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.wired.com\/story\/ios-attack-watering-hole-project-zero\/\" target=\"_blank\">found a way<\/a> to install malware on iPhones that accessed those sites (known as \u201cwatering holes\u201d). Experts speculated that a government-affiliated organization launched this attack- but unlike other efforts of this kind, this one used device security flaws to compromise thousands of people, rather than a few specific targets.&nbsp;<br>Months later, a form of malware known as \u201c<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/12\/13\/new-iphone-security-alert-iphone-only-krampus-3pc-malware-campaign-confirmed\/#49baaf5dced0\" target=\"_blank\">Krampus<\/a>\u201d manifested as ads on seemingly legitimate websites; \u201cKrampus\u201d would hijack iPhone users\u2019 browsers, potentially reading their data as they did so. Krampus is unique for exclusively targeting iPhones and iPhones alone, demonstrating that exploiting iOS device security flaws can be a lucrative market.  <\/p>\n\n\n\n<h3 style=\"font-size:16px;\">How to Prepare<\/h3>\n\n\n\n<p style=\"text-align:justify;\">Make sure to integrate your organization\u2019s iPhones into whatever management solution you use- including that solution\u2019s security and lockdown features. If your company\u2019s iPhones are compromised, neutralizing and quarantining them is essential.&nbsp;<\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>Media Playing and Audiovisual Surveillance with Smart TVs<\/strong><\/h2>\n\n\n\n<p style=\"text-align:justify;\">Smart TVs- TVs which feature apps and other functionality in line with those seen on smartphones- have become quite popular. For example, among millenials with broadband internet, around half own a smart TV. Smart TVs and companion devices, including TV sticks like Chromecast,&nbsp; have also secured a place in many businesses as a form of digital signage.&nbsp;<\/p>\n\n\n\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><i>\nIf a <b>smart TV<\/b> is equipped with a camera and microphone, malicious actors may be able to access them, and use them to spy on device owners.   \n<\/i><\/p>\n<\/div>\n\n\n\n<p style=\"text-align:justify;\">Given the prevalence of these devices, it\u2019s disconcerting that they are open to a range of device security flaws. For one, hackers can use exploits to play media of their choice from vulnerable devices. The ways this can be applied range from the potentially embarrassing- <a href=\"https:\/\/techcrunch.com\/2019\/01\/02\/chromecast-bug-hackers-havoc\/\" class=\"broken_link\">such as playing specific YouTube videos without the consent of the device owner<\/a>&#8211; to the sinister- such as <a href=\"https:\/\/www.pentestpartners.com\/security-blog\/hacking-the-echo-echo-echo\/\">having smart TVs issue commands to Amazon Echo smart assistants<\/a>, thereby disabling house security and making unauthorized purchases.&nbsp;<\/p>\n\n\n\n<p style=\"text-align:justify;\">Even worse, if a smart TV is equipped with a camera and microphone, malicious actors may be able to access them, and use them to spy on device owners. This is exacerbated by the fact that manufacturers may only release security updates infrequently, leaving device security flaws at the mercy of whoever has devised new tactics in the meantime.  <\/p>\n\n\n\n<h3 style=\"font-size:16px;\">How to Prepare<\/h3>\n\n\n\n<p style=\"text-align:justify;\">As mentioned above, device security flaws in smart TVs and related devices at least partially stem from outdated firmware. Before purchasing these kinds of devices for your organization, take the time to check the frequency with which a given manufacturer updates their devices, and invest only in those that do consistently keep their products updated.&nbsp;<\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>Virtual Reality<\/strong><\/h2>\n\n\n\n<p style=\"text-align:justify;\">Virtual reality headsets provide a unique way of experiencing digital content, immersing users in the world that appears around them.&nbsp; It should come as no surprise that some virtual reality device security flaws exist- but the disturbing implications of this kind of security exploit may surprise you.&nbsp;<\/p>\n\n\n\n<p style=\"text-align:justify;\">VICE reports that researchers <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.vice.com\/en_us\/article\/8xz33p\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\" target=\"_blank\">have identified vulnerabilities<\/a> in virtual reality chat rooms that let malicious actors commandeer the devices of anyone who enters those chat rooms. Once a malicious actor succeeds in controlling the device of someone who visits that chat room, that actor can manipulate the auditory and visual streams that the user experiences, quite literally changing their reality. Plus, because the vulnerability is based on accessing a chatroom, hackers can spread invitations to compromised chat rooms via hacked devices, resulting in an exponentially increasing number of device security flaws.&nbsp;<\/p>\n\n\n\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><i>\nVICE reports that researchers <a target=\"blank\" href=\"https:\/\/www.vice.com\/en_us\/article\/8xz33p\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\" rel=\"noopener noreferrer\">have identified vulnerabilities<\/a> in virtual reality chat rooms that let malicious actors commandeer the devices of anyone who enters those chat rooms.<\/i>\n<\/div>\n\n\n\n<p style=\"text-align:justify;\">VR and its sister technology, augmented reality, will only become more immersive in the near future; in late 2019, researchers unveiled <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.sciencedaily.com\/releases\/2019\/11\/191120131255.htm\" target=\"_blank\">\u201cepidermic VR,<\/a>\u201d an elaborate network of actuators to convey touch sensations in VR. Therefore, it\u2019s essential to address device security flaws now, rather than later, when the potential distress caused by hijacking a VR experience will grow only greater.&nbsp;<\/p>\n\n\n\n<h3 style=\"font-size:16px;\">How to Prepare<\/h3>\n\n\n\n<p style=\"text-align:justify;\">Employing a unified endpoint management solution to manage your devices can help, as UEM providers like 42Gears have integrated support for VR devices into their software, securing them along with every other device in your network.&nbsp;<\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>Windows 7 Holdovers pose major security risks<\/strong><\/h2>\n\n\n\n<p style=\"text-align:justify;\">At the beginning of 2020, Microsoft stopped supporting Windows 7 with the intent of pushing users to upgrade to Windows 10, thereby alleviating Windows 7 device security flaws. This was followed by Microsoft ending support for Office 2010 software in October of 2020. Given that <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/how-many-pcs-are-still-running-windows-7-today\/\" target=\"_blank\">around 200 million devices<\/a> likely ran Windows 7 at the beginning of 2020, many enterprises have surely been impacted.&nbsp;<\/p>\n\n\n\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><i>\nWithout a way to safeguard against malicious actors, and with a large number of users happy to use outdated software, Windows 7 computers will only gain more device security flaws, and attract the attention of more hackers than ever before, as time goes on.<\/i> \n<\/div>\n\n\n\n<p style=\"text-align:justify;\">Although Microsoft does offer enterprises continued support through an extended support program, its pricing increases substantially year-on-year so as to encourage migration to current Windows 10 software. Without a way to safeguard against malicious actors, and with a large number of users happy to use outdated software, Windows 7 computers will only gain more device security flaws, and attract the attention of more hackers than ever before, as time goes on.&nbsp;<\/p>\n\n\n\n<h3 style=\"font-size:16px;\">How to Prepare<\/h3>\n\n\n\n<p style=\"text-align:justify;\">As Microsoft suggests, upgrading to Windows 10 is the best way to fix device security flaws related to Windows 7. If you ask each employee to update their own devices, it is very hard to guarantee that everyone has complied. 42Gears\u2019 SureMDM software includes tools to integrate Windows 7 devices into your network, and from there, to easily update them from the central SureMDM console.&nbsp;<br><\/p>\n\n\n\n<p><h2 style=\"font-size:20px;\"><strong>Conclusion<\/strong><\/h2><\/p>\n\n\n\n<p style=\"text-align:justify;\">Perhaps the most important fact for CTOs to consider is the sheer range of devices on which major device security flaws exist. For this reason, it\u2019s essential to have a platform that can handle all of these kinds of devices at the same time. Unified endpoint management software, like SureMDM by 42Gears, makes this possible. By pushing updates to any kind of device remotely, you can ensure that devices have the latest security updates.&nbsp;<br><\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2020\/03\/new-Footer-5-Device-Security-Flaws-every-CTO-must-be-prepared-to-deal-with-in-2020.jpg'); background-position: center; padding: 40px; border-radius: 5px; margin-top: 16px;\">\n<h2 style=\"font-size: 24px; color: #fff; margin-top: 0px;\">SureMDM &#8211; Mobile Device Management Solution<\/h2>\n<p style=\"font-size: 16px; margin-bottom: 0px; line-height: 26px; color: #fff;\">Don\u2019t let malicious apps threaten sensitive data on managed devices. <br>Protect them with MTD and SureMDM.<\/p>\n<p style=\"margin-top: 32px; display: inline-block;\"><a style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: #ff9041; color: #ffffff; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px; margin-right: 16px;\" href=\"https:\/\/suremdm.42gears.com\/console\/?registration=true&amp;uem=true\" target=\"_black\" rel=\"noopener noreferrer\">TRY FOR FREE<\/a><a style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: transparent; color: #ff9041; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" href=\"https:\/\/www.42gears.com\/solutions\/mobile-threat-defense\/\" target=\"_black\" rel=\"noopener noreferrer\">READ MORE<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Any responsible CTO would want their company\u2019s devices to be free of flaws- but the only way to avoid having to deal with device security flaws in 2021 would be to simply not have any devices at all. No matter how much you try, there\u2019s no way to completely prepare in advance for what device&hellip;<\/p>\n","protected":false},"author":7,"featured_media":66607,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23,398,399],"tags":[368],"class_list":["post-48527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enterprise-mobility","category-uem","category-unified-endpoint-management","tag-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Device Security Flaws | 42Gears SureMDM | 2021 Cybersecurity<\/title>\n<meta name=\"description\" content=\"Learn about 5j major device security flaws that could impact your business in 2021, and how to use UEM technology (like SureMDM by 42Gears).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021\" \/>\n<meta property=\"og:description\" content=\"Learn about 5j major device security flaws that could impact your business in 2021, and how to use UEM technology (like SureMDM by 42Gears).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-06T19:16:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-30T12:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"540\" \/>\n\t<meta property=\"og:image:height\" content=\"291\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021\",\"datePublished\":\"2021-05-06T19:16:29+00:00\",\"dateModified\":\"2024-12-30T12:52:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\"},\"wordCount\":1517,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg\",\"keywords\":[\"mobile security\"],\"articleSection\":[\"Enterprise Mobility\",\"UEM\",\"Unified Endpoint Management\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\",\"url\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\",\"name\":\"Device Security Flaws | 42Gears SureMDM | 2021 Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg\",\"datePublished\":\"2021-05-06T19:16:29+00:00\",\"dateModified\":\"2024-12-30T12:52:04+00:00\",\"description\":\"Learn about 5j major device security flaws that could impact your business in 2021, and how to use UEM technology (like SureMDM by 42Gears).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg\",\"width\":540,\"height\":291,\"caption\":\"Security software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Device Security Flaws | 42Gears SureMDM | 2021 Cybersecurity","description":"Learn about 5j major device security flaws that could impact your business in 2021, and how to use UEM technology (like SureMDM by 42Gears).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/","og_locale":"pt_BR","og_type":"article","og_title":"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021","og_description":"Learn about 5j major device security flaws that could impact your business in 2021, and how to use UEM technology (like SureMDM by 42Gears).","og_url":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2021-05-06T19:16:29+00:00","article_modified_time":"2024-12-30T12:52:04+00:00","og_image":[{"width":540,"height":291,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021","datePublished":"2021-05-06T19:16:29+00:00","dateModified":"2024-12-30T12:52:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/"},"wordCount":1517,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg","keywords":["mobile security"],"articleSection":["Enterprise Mobility","UEM","Unified Endpoint Management"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/","url":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/","name":"Device Security Flaws | 42Gears SureMDM | 2021 Cybersecurity","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg","datePublished":"2021-05-06T19:16:29+00:00","dateModified":"2024-12-30T12:52:04+00:00","description":"Learn about 5j major device security flaws that could impact your business in 2021, and how to use UEM technology (like SureMDM by 42Gears).","breadcrumb":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg","width":540,"height":291,"caption":"Security software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/fr\/blog\/5-device-security-flaws-every-cto-must-be-prepared-to-deal-with-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/pt-br\/"},{"@type":"ListItem","position":2,"name":"5 Device Security Flaws Every CTO Must Be Prepared To Deal With In 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2021\/05\/Security.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/48527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/comments?post=48527"}],"version-history":[{"count":23,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/48527\/revisions"}],"predecessor-version":[{"id":110177,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/posts\/48527\/revisions\/110177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media\/66607"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/media?parent=48527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/categories?post=48527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/pt-br\/wp-json\/wp\/v2\/tags?post=48527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}