SureCop
Mobile device security threats you should know about
For most purposes smartphones today are almost as powerful as computers. There are now more phones in the world than the number of computers. Phones are being used by people to check emails, browse web, make online payments, download games, take pictures, track location and much more. Along with these powerful features we should also…
Read MoreBest approach to deploying a Mobile Device Management system
The company leadership has identified the need for a system to effectively manage mobile devices in your organization. As the best IT guy around here you have been given the mandate to roll-out the system. You obviously will start looking for solutions in the market that can solve the problem for you. But there are…
Read MoreUnderstanding Windows Mobile Application Security Policies
Execution of programs on Windows Mobile devices depends on the application signatures and their permission levels. Devices can be configured to the following security settings. Security off Unsigned applications are allowed to run without any prompt and they can access privileged APIs, or protected areas of the registry and file system. One-tier prompt The device…
Read MoreHow Max recovered his lost mobile phone? (Complete Story)
Max left his office after a hard day at work. As soon as he got into a taxi outside the office, his phone started ringing. The call was from the boss who asked Max to immediately respond to an important client’s email. Max kept his Windows Mobile phone aside on the empty seat before taking…
Read More