The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Comment pouvons-nous vous aider ? Vous trouverez l'aide qu'il vous faut.
Register or Connect directly to Citadel Team
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 21 mars 2019
If smartphones have become such an indispensable tool for individuals and professionals, it is particularly due to the mobile applications that support our daily activities.
However, an innocent action such as downloading and using an application on a smartphone doesn’t come without risks. While the vast majority of applications pose no threat to an organization or its employees, others can go a long way in compromising strategic and sensitive information.
According to a NowSecure study of more than 400,000 applications available in Google Play Store, 11% leak sensitive information and 25% pose at least a significant security risk. Not to mention that half of Android and iOS applications, including the most popular ones, send data to one or more ad networks, including phone numbers, IMEI numbers, call history and location.
In some cases, an apparently legitimate application contains hidden and malicious features that can even take control of your phone, and access sensitive information such as passwords, photos and banking details.
For professionals, the risks are real. An application can access data that you think is protected and secure, without you even noticing it. Business contacts, instant messages, emails and confidential documents… nothing is safe if you do not apply strict security rules.
The consequences of downloading a malicious application can be serious. In-depth review:
Thousands of such cases are reported every year, but the most worrying are those that are yet to be discovered. In the meantime, the following are real cases:
Hackers have created an application called “Update WhatsApp Messenger” using WhatsApp Inc. as the developer’s name. Available on Google Play Store and downloaded more than a million times by Android users, this application was able to install other advertising programs.
In the United States, Android applications used by army combat troops contained significant vulnerabilities. Hackers had access to information exchanged between soldiers. These mobile applications included instant messaging features to coordinate with other services, posted mission objectives and goals, showed satellite images of the surrounding areas, and highlighted locations of enemy and friendly forces. Luckily, these apps were only used during training. But this security issue is reminiscent of another: the geolocation of US military bases abroad when soldiers used an application during their daily jogging exercises. It was then possible to know who was running, where, and when.
Antivirus or smartphone optimization? This is the kind of application hiding real digital dangers. This virus runs on Android and can steal €1,000 from a PayPal account, even when it is secured using two-factor authentication. The Trojan is hidden in applications hosted on a third-party marketplace.
Hidden behind payment, finance, cashback and shopping apps, Anubis opens a communication channel with a remote server to steal passwords and clear bank accounts.
Professional smartphones are sometimes used outside business hours by the children of employees. They download games that can be malicious. This is the case with the famous Fortnite game. While the game is not downloadable online, fraudulent clones are available on Google Play Store to attract the least cautious users. In the end, the application contains a virus, malware or spyware, and can have serious consequences, even after it has been removed from the phone.
It may not be enough, but it is a first essential step. The first thing to do is to set up mandatory awareness training for all smartphone users. The rules are simple:
The purpose of security rules is to control software on professional smartphones and tablets. Two levels of security rules can be applied
This first security approach is implemented using MDM (Mobile Device Management) solutions and other mobile security solutions.
This step focuses on data security (files, location information, audio/video capture…) accessible to applications installed on a smartphone.
Certain MAM (Mobile Application Management) solutions offer these features, purely as a software approach. Only a secure smartphone solution provides deep protection by combining secure application layers and operating system defenses, as well as using a secure hardware component.
Defense, research, finance, banking, consulting… There are numerous industries where information security is paramount. New technologies and new uses combining immediacy and mobility are finding their way everywhere. Without securing mobile apps and smartphones, it can be difficult to develop a real defense plan. As you secure your home, office, and website, shouldn’t you do the same for your smartphone?
Cet article vous a plu ? N'hésitez pas à le partager