{"id":23055,"date":"2018-06-13T10:26:53","date_gmt":"2018-06-13T08:26:53","guid":{"rendered":"http:\/\/dev.radioislam.org.za\/wordpress\/2018\/06\/13\/how-safe-are-mobile-phones-from-threats\/"},"modified":"2018-06-13T10:26:53","modified_gmt":"2018-06-13T08:26:53","slug":"how-safe-are-mobile-phones-from-threats","status":"publish","type":"post","link":"https:\/\/radioislam.org.za\/a\/how-safe-are-mobile-phones-from-threats\/","title":{"rendered":"How Safe are Mobile Phones from Threats?"},"content":{"rendered":"<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><strong><em>Faizel Patel, Radio Islam News &#8211; 13-06-2018<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">With cloud technology becoming increasingly popular as a business solution, over 80% of people will be using their personal devices to access work-related data remotely.<\/p>\n<p style=\"text-align: justify;\">While this may sound like there are a lot of highly motivated and dedicated workers out there, the reality is that technological advancement has simply made this possible.<\/p>\n<p style=\"text-align: justify;\">Mobile virtualisation is a term relating to the ability to create two separate environments or personas on one device \u2013 which means private and business information and activities can be completely separate, with different security protocols.<\/p>\n<p style=\"text-align: justify;\">With advancing technology, hackers also become more advanced, so securing data has to be more effective than simply putting a fence around something or being alerted about threats coming in. The key is to embed security into every aspect of a phone \u2013 from the foundations.<\/p>\n<p style=\"text-align: justify;\">Craige Fleischer, Vice President of Integrated Mobility for Samsung South Africa, says, \u201cKnox is Samsung\u2019s guarantee of security, which gives users the freedom to work and play, how and when they want.<\/p>\n<p style=\"text-align: justify;\">\u201cThe Samsung Knox platform is built into Samsung smartphones, tablets and wearables at the manufacturing stage, so it\u2019s there before the device is even unpacked. The Knox platform consists of overlapping defence and security mechanisms that protect against intrusion, malware and more malicious threats.\u201d<\/p>\n<p style=\"text-align: justify;\">Fleicher says as the world becomes increasingly mobile, security and privacy are of utmost importance.<\/p>\n<p style=\"text-align: justify;\">\u201cBeing able to separate business from personal activities doesn\u2019t just protect businesses\u2019 sensitive data, it also protects employee\u2019s personal information.\u201d<\/p>\n<p style=\"text-align: justify;\">By 2020, an estimated 23.28 million South Africans will be using smartphones.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><strong><em><a href=\"https:\/\/twitter.com\/FaizelPatel143\" rel=\"alternate\">Twitter: @FaizelPatel143<\/a>\u00a0<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 Faizel Patel, Radio Islam News &#8211; 13-06-2018 With cloud technology becoming increasingly popular as a business solution, over 80% of people will be using their personal devices to access work-related data remotely. While this may sound like there are a lot of highly motivated and dedicated workers out there, the reality is that technological [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[226],"tags":[],"class_list":["post-23055","post","type-post","status-publish","format-standard","hentry","category-tech-reviews"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"jetpack_shortlink":"https:\/\/wp.me\/pc0QIf-5ZR","jetpack_likes_enabled":true,"publishpress_future_action":{"enabled":false,"date":"2026-04-12 18:31:50","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/posts\/23055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/comments?post=23055"}],"version-history":[{"count":0,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/posts\/23055\/revisions"}],"wp:attachment":[{"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/media?parent=23055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/categories?post=23055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/radioislam.org.za\/a\/wp-json\/wp\/v2\/tags?post=23055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}