BLOG

What’s New at CIS Mobile?

It’s been a hectic few months at CIS Mobile. Along with everyone else, we’ve adapted to a new way of working. Our team has mostly been remote for the past several months, using Slack, web conferencing, and of course, our altOS... [Read More]

Telework Challenges in a Mobile Device World

The coronavirus pandemic is affecting all walks of life. Hospitals and medical professionals are on high alert. Schools are closing. Professional sports teams are playing in empty stadiums and, in some cases, not at all. Companies and governments are reviewing how... [Read More]

The Spy in your Pocket

We have been working closely with our customers and partners to deliver a modern smartphone platform that is appropriate for sensitive government work. When we talk with customers about their requirements, one of the things we hear most often is the... [Read More]

What Makes a Secure Phone?

CIS Mobile offers a secure mobile platform that addresses the rampant supply chain problems in the mobile industry and puts effective controls in the hands of IT administrators. What does it take to make a phone secure?  To start, you need a... [Read More]

Who’s Looking Over Your Shoulder?

In today’s world, we all have a PIN – Personal Identification Number – a unique security code to verify our identity. Each person has their clever strategy of what set of numbers or patterns we use to make it easier to... [Read More]

The Goldilocks Problem of Mobile Security

Usability vs. Security The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and... [Read More]

The Dangers of Preinstalled Applications on Android

Until recently, the threats posed by preinstalled applications have been overlooked by Android security researchers.  While preinstalled apps have long been regarded as a nuisance or “bloatware” by consumers, they represent a genuine security risk to high threat mobile users (users... [Read More]