In our mission to unmask the reality of current mobile phone security practices in the workplace, we recently surveyed over 1,000 senior personnel of large businesses and multinational corporations across the globe. Sectors covered by the survey…
Read our latest thinking, ideas, and opinions…
While advancements in communication technology facilitate global collaboration, they are not immune to infiltration, and can expose organizations to sophisticated threats. The stakes are high, and the hidden dangers lurking in conference calls can…
The recent revelations regarding Chinese APT40’s exploitation of N-Day vulnerabilities underscore the urgent need for vigilance and proactive measures in the Information Security and IT sectors. Expert analysis indicates a direct threat to mobile…
In late 2023, reports surfaced that McKinsey, Deloitte, and KPMG advised their consultants against using their regular cell phones in Hong Kong, recommending the use of burner phones instead. This wasn’t the first time we, at Sotera, had heard…
In the ever-evolving landscape of mobile communication, two distinct yet crucial players have emerged: secure phones and satellite phones. Understanding the nuances between these two types of devices is essential, as making the right choice can mean…
Over the past five years, there has been a rising interest in secure phones, which can be attributed to the growing awareness of privacy and security concerns among users. As people become more reliant on smartphones for various aspects of their…
Bring Your Own Device (BYOD) policies have become popular for their ability to enhance employee satisfaction, productivity, and cost savings. However, it is important to also acknowledge the security concerns associated with these policies.…
The traditional boundaries between Physical Security and Cybersecurity are dissipating, giving rise to the need for an integrated security strategy. At the forefront of this convergence lies the mobile phone, a device that is not only vulnerable to…
In the ever-evolving landscape of cybersecurity threats, the trifecta of vishing, phishing, and smishing stands out as a relentless trio inflicting havoc on individuals and enterprises alike. But what exactly do these terms mean, and why should you…
In today’s digital age, celebrities find themselves at the mercy of hackers who prey on their high visibility and lack of security knowledge. From lone hackers to organized groups, celebrities are prime targets for phone hacking.