Content Resources

The threat of cyber security issues is real and documented. To protect your company or agency from the problems that arise from security threats and losses from data breaches and inefficiency, you need to be educated. With our content resources hub, we provide information that will help you and your team become aware of the threats, the precautions, and tools that can help prevent them.

Our team consists of experts that have experience with all the pervasive mobile and cyber security threats of today. Get more information about real-world problems through our security articles and content resources. We provide information about mobile security, cyber security, network security and other topics.

Learn More About Information Security

Mobile Security, Cyber Security, Network Security News & Articles

With this content resources hub, we aim to provide mobile and cyber security information so that you and your team can become informed about threats in the field and their solutions. Through our experience in creating mobile and cyber security solutions and by staying up to date on the latest security threats, we have a unique base of knowledge that we want to share with the public. By perusing our content resources below, you can learn more about these security threats, cyber security best practices and information security technology. Check back frequently for additional security news, cyber security articles, mobile security tips and more. For more information about the topics discussed in the resources below, feel free to contact us.

Tackling Device Management in Government Agencies

The implementation of BYOD (Bring Your Own Device) policies has become the preferred norm by employees and employers alike when it comes to mobile devices in the private sector. The BYOD trend has expanded from employees providing their own smartphones to include other devices such as tablets and laptops. Statistics have shown that the use of personal mobile devices in the workplace increases employee satisfaction and productivity. So how does the idea of BYOD sit with the public sector and how are agencies managing the need for new policies? Read More

Protecting Vital Infrastructure from Cyber Attacks

In this technological age, most of our critical infrastructure is run by computer systems. The power grid, public transportation, water treatment plants, refineries, gas lines and nuclear power plants are all at the mercy of anyone with the right software and the knowledge to initiate a cyber attack. Read More

Mobile Call Interception is a Threat to Law Enforcement?

According to McAfee's June 2014 report, Net Losses: Estimating the Global Cost of Cybercrime, the cost of economic espionage to the U.S. totals over $400 billion annually. This number is only expected to get larger as McAfee anticipates a surge in cybercrime in its 2015 predictions report. There are various means of committing cybercrime, and one of the easiest is mobile espionage. Mobile hacking and call interception are inexpensively and commonly executed to intercept corporate communications. Mobile device security technology has not kept up with our innovation and desire to make our work lives easier with the use of mobile devices, and now we're paying the price. Read More

Always Work over a Secure Connection with CommLock Connect

Sharing information between authorized personnel is essential to the success of any organization, but the process of sharing sensitive data across a network can expose these organizations to major security threats -- unless they implement an appropriate network security solution. Read More

Man in the Middle Attacks also Threaten Mobile Security

While most typically mentioned with the security issues surrounding unsecure WiFi access points, Man in the Middle attacks can happen on almost any device and can lead to your communications being compromised. Lately, the most disconcerting Man in the Middle (MITM) attacks have been aimed at cell phones. MITM attacks against mobile phones are particularly worrisome because they result in enabling the attacker to identify an individual's location, eavesdrop on conversations, and intercept and manipulate SMS messages from the victim's phone. Read More

Mobile Call Interception is Affecting You

If your job involves security or intelligence, trade secrets, or research and development, you are a target for mobile call interception. When you use your mobile phone, either at work or in your personal life, you can't guarantee that you're actually connecting with a legitimate cell tower. While you might think your phone is connected to a secure AT&T or Verizon network, it's possible that your phone is connecting to a "rogue tower" without you knowing it -- and that your calls and data are under surveillance. Read More

Introducing the Best Defense Against Mobile Espionage: Network Guard

Thanks to the proliferation of both cell phones and mobile surveillance devices in the past decade, corporate espionage has become increasingly sophisticated. Nefarious organizations or individuals don't need to search through a competitor's trash or send a spy to infiltrate a company's headquarters when trade secrets and other sensitive information can be obtained by intercepting calls, SMS transmissions, and data from employees' cell phones. Read More

An Ounce of Prevention: Preserving Information Confidentially in a Digital Economy

While the Internet has redefined how individuals and organizations access and share information globally, it also has made them more susceptible to theft of classified and confidential digital information. Most business development and activity occurs online, making information easier to steal and transfer anonymously. Read More

Your Data is Never Secure without Secure Hardware

The increased use of tablets and other mobile devices for both personal and business-related purposes has led to a growing concern regarding mobile security. Private organizations and government agencies face significant challenges with ensuring mobile access to data and services is secure. Bring-your-own-device (BYOD) policies are becoming commonplace, as employees often use the same device to access corporate and personal data both at work and home. Read More

Interested in learning more about Charon?

We’d like to hear from you.

Charon Technologies, LLC
13615 Dulles Technology Drive
Suite 100
Herndon, VA 20171

[Phone] 703.662.6061
[Email] info@charontech.com