Content Resources

The threat of cyber security issues is real and documented. To protect your company or agency from the problems that arise from security threats and losses from data breaches and inefficiency, you need to be educated. With our content resources hub, we provide information that will help you and your team become aware of the threats, the precautions, and tools that can help prevent them.

Our team consists of experts that have experience with all the pervasive mobile and cyber security threats of today. Get more information about real-world problems through our security articles and content resources. We provide information about mobile security, cyber security, network security and other topics.

Learn More About Information Security

Mobile Security, Cyber Security, Network Security News & Articles

With this content resources hub, we aim to provide mobile and cyber security information so that you and your team can become informed about threats in the field and their solutions. Through our experience in creating mobile and cyber security solutions and by staying up to date on the latest security threats, we have a unique base of knowledge that we want to share with the public. By perusing our content resources below, you can learn more about these security threats, cyber security best practices and information security technology. Check back frequently for additional security news, cyber security articles, mobile security tips and more. For more information about the topics discussed in the resources below, feel free to contact us.

Tackling Device Management in Government Agencies

Published September 2, 2015

The implementation of BYOD (Bring Your Own Device) policies has become the preferred norm by employees and employers alike when it comes to mobile devices in the private sector. The BYOD trend has expanded from employees providing their own smartphones to include other devices such as tablets and laptops. Statistics have shown that the use of personal mobile devices in the workplace increases employee satisfaction and productivity. So how does the idea of BYOD sit with the public sector and how are agencies managing the need for new policies? Read More

Protecting Vital Infrastructure from Cyber Attacks

Published April 21, 2015

In this technological age, most of our critical infrastructure is run by computer systems. The power grid, public transportation, water treatment plants, refineries, gas lines and nuclear power plants are all at the mercy of anyone with the right software and the knowledge to initiate a cyber attack. Read More

Corporate Espionage is Easy. What Are You Going to Do About it?

Published April 21, 2015

Despite the efforts of law enforcement and government agencies to conceal their use of IMSI catchers (also known as stingrays) this cat is long out of the bag and several miles down the road. However, what the somewhat outraged general public may not understand is that this mobile call interception technology has already evolved to the point where it is affordable to many people and organizations around the world, not just first-world government agencies. Mobile call interception devices can now be easily built and assembled by non-government personnel with decent technical know-how. It is frightening to think that criminal organizations now have many of the same surveillance capabilities as the authorities do. So, what does all this mean for law enforcement itself? Read More

Mobile Call Interception is a Threat to Law Enforcement?

Published April 21, 2015

According to McAfee's June 2014 report, Net Losses: Estimating the Global Cost of Cybercrime, the cost of economic espionage to the U.S. totals over $400 billion annually. This number is only expected to get larger as McAfee anticipates a surge in cybercrime in its 2015 predictions report. There are various means of committing cybercrime, and one of the easiest is mobile espionage. Mobile hacking and call interception are inexpensively and commonly executed to intercept corporate communications. Mobile device security technology has not kept up with our innovation and desire to make our work lives easier with the use of mobile devices, and now we're paying the price. Read More

Small Government Agencies are Vulnerable to Security Threats Too

Published April 21, 2015

While large government agencies get more media attention when they experience a data breach, smaller agencies -- those with 6,000 employees or fewer -- are just as vulnerable to these types of attacks. In 2014 alone, smaller agencies including the Government Publishing Office and the Government Accountability Office suffered information security breaches alongside larger agencies like the Postal Service and the State Department. Read More

Always Work over a Secure Connection with CommLock Connect

Published March 19, 2015

Sharing information between authorized personnel is essential to the success of any organization, but the process of sharing sensitive data across a network can expose these organizations to major security threats -- unless they implement an appropriate network security solution. Read More

Man in the Middle Attacks also Threaten Mobile Security

Published February 19, 2015

While most typically mentioned with the security issues surrounding unsecure WiFi access points, Man in the Middle attacks can happen on almost any device and can lead to your communications being compromised. Lately, the most disconcerting Man in the Middle (MITM) attacks have been aimed at cell phones. MITM attacks against mobile phones are particularly worrisome because they result in enabling the attacker to identify an individual's location, eavesdrop on conversations, and intercept and manipulate SMS messages from the victim's phone. Read More

Mobile Call Interception is Affecting You

Published January 23, 2015

If your job involves security or intelligence, trade secrets, or research and development, you are a target for mobile call interception. When you use your mobile phone, either at work or in your personal life, you can't guarantee that you're actually connecting with a legitimate cell tower. While you might think your phone is connected to a secure AT&T or Verizon network, it's possible that your phone is connecting to a "rogue tower" without you knowing it -- and that your calls and data are under surveillance. Read More

Introducing the Best Defense Against Mobile Espionage: Network Guard

Published January 23, 2015

Thanks to the proliferation of both cell phones and mobile surveillance devices in the past decade, corporate espionage has become increasingly sophisticated. Nefarious organizations or individuals don't need to search through a competitor's trash or send a spy to infiltrate a company's headquarters when trade secrets and other sensitive information can be obtained by intercepting calls, SMS transmissions, and data from employees' cell phones. Read More

The Costs of Mobile Isolation in Sensitive Compartmented Information Facilities (SCIFs)

Published January 23, 2015

If you've ever worked in a SCIF or other secure areas where mobile technology is prohibited, you know the pains of being isolated from the outside world. Not only are you stuck in an often windowless, sterile room for hours upon hours, day after day, but you're digitally cut off from the rest of the world. Read More

Security in Government Facilities: Bringing SCIFs into the 21st Century

Published January 23, 2015

In the history of SCIFs or Sensitive Compartmented Information Facilities, security measures have generally pertained to protection against human attack or infiltration. There are seemingly endless specifications regarding secure locks, vaults, wall thickness, construction materials, vents and ducts, intrusion alarms, etc. In a largely digital world where sensitive information is captured through means that don't require human presence, it's time to ensure we are secure from digital intrusions as well. Read More

An Ounce of Prevention: Preserving Information Confidentially in a Digital Economy

Published January 23, 2015

While the Internet has redefined how individuals and organizations access and share information globally, it also has made them more susceptible to theft of classified and confidential digital information. Most business development and activity occurs online, making information easier to steal and transfer anonymously. Read More

Your Data is Never Secure without Secure Hardware

Published January 23, 2015

The increased use of tablets and other mobile devices for both personal and business-related purposes has led to a growing concern regarding mobile security. Private organizations and government agencies face significant challenges with ensuring mobile access to data and services is secure. Bring-your-own-device (BYOD) policies are becoming commonplace, as employees often use the same device to access corporate and personal data both at work and home. Read More

Interested in learning more about Charon?

We’d like to hear from you.

Charon Technologies, LLC
13615 Dulles Technology Drive
Suite 100
Herndon, VA 20171

[Phone] 703.662.6061