smartphones

‘Dirty Dozen’ Unsecured Smartphones

Billy Gordon Green, Jr. M.Ed., CPP, CHS News, Security Program Development

On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …

FBI Investigates Cyberjacking

Protus3 Fraud

September 16, Infosecurity – (National) FBI probes over 400 cases of corporate bank account cyberjacking. The FBI is currently investigating over 400 reported cases of corporate banking account takeovers in which cybercriminals have initiated unauthorized automated clearing house (ACH) and wire transfers from U.S.-based organizations, an FBI official told a U.S. House panel the week of September 12. Through this …

Darren Nix Presents at NCTA’s Emerging Tech & Trends Series

Protus3 News

Darren Nix participated in a moderated panel discussion on Cyber Security as part of the North Carolina Technology Association’s Emerging Technologies & Trends Series. The Emerging Technologies & Trends Series is an interactive panel discussion that features member companies as subject matter experts. Held monthly, each event tackles topics that impact the technology industry in North Carolina. The goal of …

RMA Joins North Carolina Technology Association

Protus3 News

Risk Management Associates has joined the North Carolina Technology Association. The North Carolina Technology Association (NCTA) is the intersection of leadership and technology fueling the growth of North Carolina through Executive Engagement, Public Affairs, and a Knowledge Workforce. The North Carolina Technology Association’s mission is Making North Carolina Number One in Technology and Technology Number One in North Carolina. The …

Cell Phones Are Safe… Aren’t They?

Protus3 Uncategorized

Imagine this scenario: You’re unavoidably called out of town for the week and are reluctantly forced to delegate the operation of a meeting with some important clients to Bob, an employee who, despite his best efforts, is less than “tech-savvy.” Everything seems to be going swimmingly though, and the meeting is set to begin on time. Just before everyone takes …