Data & Device Security

Absolute Software Launches Computrace Mobile Theft Management

Absolute Software is proud to launch, Computrace Mobile Theft Management (MTM). Computrace Mobile Theft Management is a service that allows you to safeguard your iPad and iPad mini devices from loss and theft. Computrace Mobile Theft Management specializes in both loss prevention and theft investigation, providing full mobile theft support through the lifecycle of your corporate device management needs. Computrace MTM loss prevention includes: Device registration within the Absolute Device Database...

READ MORE
Stolen Mobile Phone Database – Little Effect on Theft
Stolen Mobile Phone Database – Little Effect on Theft

When the National Stolen Phone Database was introduced last fall it was hoped it would deter mobile phone theft in the US. So far, that has not been the result. As we discussed in an earlier post, although this blacklist is a good step in stemming crime, it will not stop it. Mobile devices will continue to be stolen, exported to other markets for resale, sold to electronic recyclers or...

READ MORE
Unprotected Mobile Devices at Risk with Growing Mobile Theft Epidemic
Unprotected Mobile Devices at Risk with Growing Mobile Theft Epidemic

There’s a reason that TIME magazine recently ran a story calling cell phone theft an epidemic: with over 113 cell phones lost or stolen every minute in the US and thefts accounting for over $30 billion in 2012 (not including potential losses of personal or breaches of sensitive corporation information), mobile theft has become the next big crime epidemic. Ireland recently released that nearly 8,000 smartphones were stolen in the first 6 months of...

READ MORE
Obama Prioritizes Cybersecurity
Obama Prioritizes Cybersecurity

President Obama released the budget for 2014 outlining a $1 billion increase in cybersecurity spending, increasing the figure to $13 billion. The budget acts as a statement of priorities for the federal government, so the increase is dependent on the ability of Congress to pass appropriation bills for specific programs. In his budget message, Obama says: “We must also confront new dangers, like cyber attacks, that threaten our Nation’s...

READ MORE
BYOD Feared to Increase Insider Fraud Risk

Recently, Attachemate Corporation and the Ponemon Istitute released the second annual “Risk of Insider Fraud” report indicating that it takes 87 days to first recognize an instance of insider fraud and more than 3 months to get at the cause of the fraud. Insider fraud is defined as a malicious act by employees to steal financial or information assets. In nearly three quarters of respondents, employee malfeasance has caused...

READ MORE