VoicePlus Blogs

It can be tricky to implement a mobile security policy without disrupting your workforce. Problems arise further when you factor in the rise of hybrid work arrangements and the poor device visibility that arises from them.
There have always been security concerns with AI, and one of them has come to the fore in the form of AI-powered attack methods that cut exploitation time in half.
Travelling can be exciting, but it also exposes your devices to security risks.
The Rise of the Digital Wallet Cash, it turns out, may no longer be king. Electronic payment systems, specifically digital wallets, have transformed the way individuals make payments. With tools like Apple Pay, Google Pay, and Samsung Wallet, consumers can now store payment cards, loyalty points, and other credentials digitally.
When there is no corporate mobile phone policy, don’t complain if employee behavior costs the business - both in reputation and the bottom-line!
What is MDM? (Mobile Device Management) MDM stands for Mobile Device Management. It is a technology solution for securing and managing mobile devices like smartphones, tablets, and laptops. MDM aims to allow organisations to manage and secure the devices and data they use while also improving user productivity.
Mobile identity management refers to the process of verifying and managing the digital identity of a mobile user. It involves establishing and verifying the identity of a user accessing mobile applications, services, and resources. Mobile identity management is essential for ensuring mobile users and their data's security and privacy.
The ACMA is consulting on proposed new rules to help prevent scammers from targeting high-risk customer interactions with telcos, such as SIM swap requests, changes to accounts and disclosure of personal information.
FBI and CISA have observed an Iranian government-sponsored APT group that are exploiting vulnerabilities to gain access to systems. The APT group has exploited the same Microsoft Exchange vulnerability in Australia.
Microsoft has identified active exploitation of a vulnerability in Microsoft Excel. Affected Australian organisations should apply the available security update as soon as possible.
3 Strategies to Reduce Telecom Cost