Apply Mobile @ The Institution of Analysts and Programmers Conference 2012

There are a number of factors that need to be considered when deploying Mobile, either as a consumer offering through an Application or “App” or as a business tool for your workforce. It has been well documented through the press and other media that the number of attacks on Mobile technologies are significantly increasing as Attackers and Hackers find new ways of compromising data to gain unauthorised access to systems or to make financial gain. When embarking on a mobile project, it is important to carry out a Threat Assessment or as it is sometimes called “Threat Modelling”.

Leave a Reply