Security

/Security

Personal Identifiable Information Exposed: Equifax

2017-11-28T11:28:28+00:00 September 13th, 2017|Categories: Policy, Security|Tags: , , , |

Sheila Cundiff Content Specialist AOTMP Personal Identifiable Information Exposed: Equifax “The data breach is one of the worst ever, by its reach and by the kind of information exposed to the public.” – CNN Tech “Equifax will not be defined by this incident, rather by how we respond.” – Rick Smith, [...]

Ask the Telecom Pro | EU Roaming Rules | PUK Codes

2017-11-28T11:31:47+00:00 July 11th, 2017|Categories: Ask The Telecom Pro, Carriers, Cellular, EMM, MDM, Mobility, Security|Tags: , , , , |

Timothy C. Colwell SVP, Efficiency First® Adoption AOTMP Ask the Telecom Pro EU Roaming rules | PUK Codes   Q:  Do the new EU roaming rules eliminate all roaming charges for mobile users in Europe?  A:  On June 15, 2017 mobile roaming charges for voice, data and SMS were eliminated for [...]

What SIP Security and Ice Cream Have in Common

2017-06-01T13:21:07+00:00 March 22nd, 2017|Categories: Security, SIP|Tags: , , , , , , , |

What SIP Security and Ice Cream Have in Common As enterprises continue to put SIP technology into their telecom environments, they need to do whatever they can to support the integrity of their networks. That starts with SIP security, which organizations would do well to think of as the very top part of an [...]

Mobile Security – A Very Scary World

2017-06-01T15:04:24+00:00 March 8th, 2017|Categories: Mobility, Security|Tags: , , , , , , , |

Mobile Security - A Very Scary World   Santosh Krishnan, Lookout Last month, AOTMP’s Telecom Management Industry Update started exploring mobile security and enterprises’ ten-dency to react to intrusions and problems, rather than employ proactive strategies. One area that stood out was the question of how the cloud impacts mobile security. Turns [...]

How to Start Securing Enterprise Mobile Devices

2017-06-01T15:36:46+00:00 February 22nd, 2017|Categories: Mobility, Security|Tags: , , , , , , , |

Shredding iPads Doesn't Count: How to Start Securing Enterprise Mobile Devices The recently disclosed Tesco bank hack, last year’s Pegasus spyware targeting iOS, infected apps on the Google Play Store – every day seems to bring more examples of mobile device attacks that could disable or even dismantle a business. Anecdotes further highlight the [...]

The Rapid Deployment of IoT: What Challenges Should We Expect?

2017-03-02T12:05:17+00:00 January 27th, 2017|Categories: IoT, Security|Tags: , , |

Bill Hinton VP & General Manager, Vendor Practice AOTMP The Rapid Deployment of IoT: What Challenges Should We Expect? AOTMP recently had the pleasure of presenting Mobility Award winners IBM, for the Watson IoT Platform, and Raspberry Pi for hardware. Each company is significantly and positively impacting the “IoT Space” and [...]