These WhatsApp status trackers are a new variety of surveillance software, but can be just as invasive and harmful as stalkerware.
Author: Louisa Stockley
This infographic breaks down mobile security for businesses and explains how and why it is a key player in GDPR compliance.
Financial Services
Your phones a hot target for phishing attacks and data theft, and the front line in guarding against FCA and GDPR violations.
Domiciliary Care Providers
Carers carry access to personal data on their phones and tablets, so how do you secure them and avoid CQC and GDPR violations?
Traced Wins Bronze at 17th Annual 2021 Cyber Security Global Excellence Awards
Recruitment
Recruiters’ phones a prime target for phishing attacks and malware, and need securing from data loss and theft just like laptops and computers.
Demystifying mobile security
What is MDM? What is MTD? Or EMM? Your one-stop guide to mobile security acronyms and how the solutions fit together
In this short video, Ben demonstrates a MitM attack via a local coffee shop WiFi.
A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defense protects your remote workforce from data theft and loss?
Matt Boddy chats with Neil C Hughes on his Tech Talks Daily podcast about mobile threats, the difficulty security vendors have and what makes Traced groundbreaking.