Uncategorized

What Makes a Secure Phone?

CIS Mobile offers a secure mobile platform that addresses the rampant supply chain problems in the mobile industry and puts effective controls in the hands of IT administrators. What does it take to make a phone secure?  To start, you need a... [Read More]

Who’s Looking Over Your Shoulder?

In today’s world, we all have a PIN – Personal Identification Number – a unique security code to verify our identity. Each person has their clever strategy of what set of numbers or patterns we use to make it easier to... [Read More]

The Goldilocks Problem of Mobile Security

Usability vs. Security The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and... [Read More]

The Dangers of Preinstalled Applications on Android

Until recently, the threats posed by preinstalled applications have been overlooked by Android security researchers.  While preinstalled apps have long been regarded as a nuisance or “bloatware” by consumers, they represent a genuine security risk to high threat mobile users (users... [Read More]

altOS – A Better Mobility Solution for Government

There have been many previous attempts to design a secure phone for government use. They have all failed to meet expectations in one way or another. At one end of the spectrum are the hyper-secure phones that were designed from the... [Read More]