Part #5 Teaser: The New and Dangerous Wave of Mobile Threats

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=3DDxvcPr9oE



Duration: 1:08
201 views
5


To watch the full episode sign up for our 8-part video guide: https://pages.checkpoint.com/securing-your-remote-workforce-signup.html

The fifth episode explores the recent rise in the number of mobile attacks and data breaches happening from the mobile endpoint, discovered by Check Point researchers. The group uncovered Coronavirus-related malicious campaigns, sophisticated mobile ransomware attacks, and even Mobile Device Management (MDM) getting weaponized to attack organizations.




Other Videos By Check Point Software


2020-10-15Check Point's Secure Access Service Edge (SASE) - Secure Access for Remote Users & Branches
2020-10-14The next decade: opportunity in uncertain times with futurist Yahli Admati
2020-10-14Cloud CheckMe - Instant Assessment for Cloud
2020-10-13Part #7: What Can a Malicious Email Do?
2020-10-13Amazon Prime Day 2020 and the Best Ways to Deal with the Hackers
2020-10-06Protecting Sensitive Data For Six Million Residents In Region Lazio, Italy
2020-10-06Master Mentalist, Lior Suchard, Featured Guest Speaker at Check Point SECURE Cloud
2020-10-04Part #6 Teaser: 5 Principles for Choosing the Right Mobile Security Solution
2020-10-01Talking iTech: Hacking the Brain with Prof. Moran Cerf
2020-10-01Check Point’s CMO, Peter Alexander Previews Check Point SECURE Cloud 2020
2020-09-28Part #5 Teaser: The New and Dangerous Wave of Mobile Threats
2020-09-24Brazilian CIO Talks Through His Check Point Decision: Scale, Economics and Control
2020-09-24Check Point Protects Branch Office Microsoft Azure Internet and SaaS Applications from Cyber Attacks
2020-09-24#InstaHack: How Researchers Were Able to Take Over the Instagram App Using a Malicious Image
2020-09-22Infinity Total Protection – Training
2020-09-22Infinity Total Protection – How to Activate Your New Appliances
2020-09-22Part #4 Teaser: 5 Principles for Choosing the Right Endpoint Security
2020-09-21Infinity Total Protection - How to Order Additional Software or Services
2020-09-21Infinity Total Protection - Professional Services Assistance
2020-09-18Check Point Infinity Total Protection | How Do I Order Hardware?
2020-09-18Check Point Infinity Total Protection | What Does the Solution Include?



Tags:
Remote workforce security
mobile security
email security
endpoint security
secure remote workforce