The issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement – most of it innocently – such as bringing an infected personal mobile device into the corporate network, or clicking on a social media link that looks harmless but hides a Trojan or Worm that will secretly steal data and money and, potentially, remain undetected with severe impact on security of the infected device.
- ANDREW WALKER-BROWN, SYSTEMS ENGINEERING MANAGER, NE-MEA, DELL SONICWALL
- Viewpoints
- Posted On




