VoicePlus Blogs

underline-img
What is Mobile Identity Management ?

What is Mobile Identity Management ?

Mobile identity management refers to the process of verifying and managing the digital identity of a mobile user. It involves establishing and verifying the identity of a user accessing mobile applications, services, and resources. Mobile identity management is essential for ensuring mobile users and their data's security and privacy.

Read More arrow-img
What is MDM ? (Mobile Device Management)

What is MDM ? (Mobile Device Management)

What is MDM? (Mobile Device Management) MDM stands for Mobile Device Management. It is a technology solution for securing and managing mobile devices like smartphones, tablets, and laptops. MDM aims to allow organisations to manage and secure the devices and data they use while also improving user productivity.

Read More arrow-img
Combating phone fraud: have your say on new rules

Combating phone fraud: have your say on new rules

The ACMA is consulting on proposed new rules to help prevent scammers from targeting high-risk customer interactions with telcos, such as SIM swap requests, changes to accounts and disclosure of personal information.

Read More arrow-img
Iranian Government-Sponsored APT Cyber Actors

Iranian Government-Sponsored APT Cyber Actors

FBI and CISA have observed an Iranian government-sponsored APT group that are exploiting vulnerabilities to gain access to systems. The APT group has exploited the same Microsoft Exchange vulnerability in Australia.

Read More arrow-img
Vulnerability - Palo Alto firewalls utilising the GlobalProtect VPN component

Vulnerability - Palo Alto firewalls utilising the GlobalProtect VPN component

A vulnerability has been identified in certain versions of Palo Alto firewalls utilising the GlobalProtect VPN component. Affected Australian organisations should apply the available update as soon as possible. Alert status - HIGH

Read More arrow-img
Critical vulnerability present in certain versions of Microsoft Excel

Critical vulnerability present in certain versions of Microsoft Excel

Microsoft has identified active exploitation of a vulnerability in Microsoft Excel. Affected Australian organisations should apply the available security update as soon as possible.

Read More arrow-img
Intune Service Release 2111

Intune Service Release 2111

App management Enable app update priority for Managed Google Play apps You can set the update priority of Managed Google Play apps on dedicated, fully managed, and corporate-owned with a work profile Android Enterprise devices. Select High Priority to update an app as soon as the developer has published the update, regardless of charge status, Wi-Fi capability, or end user activity on the device. For related information, see Add Managed Google Play apps to Android Enterprise devices with Intune.

Read More arrow-img
Security Challenges - US

Security Challenges - US

Remote Work Drives U.S. Surge in Security Challenges, Cloud Usage: ManageEngine Report Top 3 Attack Vectors Are Phishing, Endpoint Network Attacks and Malware; 74% of US Companies Increased Their Use of Cloud Solutions Due to the COVID-19 Pandemic

Read More arrow-img
ACSC - High Alert - Apple IOS, Macos and Safari

ACSC - High Alert - Apple IOS, Macos and Safari

Critical vulnerabilities present in certain versions of Apple iOS, macOS and Safari

Read More arrow-img
ACSC - Microsoft Azure Service - Critical Alert

ACSC - Microsoft Azure Service - Critical Alert

A remote code execution vulnerability exists in Open Management Infrastructure, a management agent used in certain Linux-based Microsoft Azure services. Exploitation of this vulnerability could allow a malicious actor to take control of the vulnerable host. Affected organisations should apply the available security update.

Read More arrow-img

3 Strategies to Reduce Telecom Cost