Zimperium logo

On-Demand Webinar:
The Mobile Security Deadly Sin of Letting Hackers Turn on Microphones and/or Cameras

Copyright © 2010 - 2019, Zimperium, Inc. All Rights Reserved

Indochino
Get Access Now

Immediate Access to Recording

Your email and personal information are confidential, and will not be sold or rented. For further information, read our Privacy Policy.

Most organizations now realize that mobile devices are an unprotected endpoint with access to, or containing all of the information of a traditional endpoint. And while there are some overlaps in what you protect, the way you solve the traditional endpoint security problem is completely different than how you solve the mobile security problem.

The chief information security officer (CISO), responsible for an organization's information and data security, has the unenviable challenge of maintaining control in a BYOD culture.

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium is hosting a series of webinars focusing on seven of the problem areas, or deadly sins, CISOs must address. 

In this webinar, we discuss the deadly sin of letting hackers turn on microphones/cameras. Watch the recording to learn about:

  • Real-world scenario of how hackers attempted to infiltrate a particular company via hacking the microphone/camera on a mobile device
  • How microphone/camera hacks differ on desktop vs mobile
  • What can be done to prevent hackers from turning on your mobile devices’ microphones and cameras
Fix the following errors:
Hide