Free Trial

Briefing Notes

Why Google and Apple’s Malware Protection Might Not Be Good Enough

Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices.

Download Briefing Note

Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?

For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from the Apple App Store or Google Play Store.

Download Briefing Note

The Rising Threat of Social Media Phishing Attacks

Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world.

Download Briefing Note

How to protect against an iOS hack

Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The rate at which they are used for personal use, as well as business operations, make mobile devices especially vulnerable to attack.

Download Briefing Note

Public Wi-Fi: Stealing Secrets in the Sky

‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep your information safe when browsing online.

Download Briefing Note

Machine Learning: a New Frontier in Mobile Phishing Protection

An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution.

Download Briefing Note

3 Key Developments in Mobile Phishing That Every Organization Should Know

Phishing attacks are becoming more common and more difficult to spot. Understanding the evolving strategies of cyber criminals is crucial to staying protected from phishing attempts.

Download Briefing Note

Understanding Alternative Approaches to Device Security

Threats against mobile devices are increasing, putting companies' sensitive information at risk. Understand the pro's and con's of Mobile Threat Defence solutions and how Corrata's technology avoids these common MTD pitfalls.

Download Briefing Note

DNS over HTTPS – Anti-Phishing Solutions are going Dark

A breakdown of DNS Sniffing and how this solution to phishing will be affected by decisions to encrypt DNS traffic.

Download Briefing Note

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps, to steal information from users. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Download Whitepaper

Today’s Mobile Threat Landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating systems, better enterprise support and the emergence of mature mobility management platforms. But significant and persistent mobile threats remain. The whitepaper explains the nature of these threats and the steps every enterprise needs to take to protect sensitive information in an ever-connected world.

Download Whitepaper

Enterprise Mobile Data Control

Enterprise mobile data consumption is growing at close to 100% annually and some analysts believe it will have increased tenfold by the end of the decade. Corrata’s Enterprise Mobility Control whitepaper explains why this is happening and what organizations need to do to manage the cost, productivity and risk implications of this data tsunami. Revised to include the impact of the end of EU roaming and Brexit.

Download Whitepaper

Infographics

Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's examine how today's tools would have worked when confronted by a modern threat such as the recent WhatsApp Pegasus spyware hack.

Download Infographic

Get the Facts about Insecure Wi-Fi

Free Wi-Fi is a phrase so commonly heard today that we come to expect it in most public places. The vast majority of hotels, restaurants, coffee shops, and transport systems today offer some form of Wi-Fi network for guests and customers but are they always safe? Unencrypted internet traffic on public networks can easily be intercepted by hackers, putting our sensitive data at risk.

Download Infographic

The Mobile Phishing Threat

With over 46,000 new sites created every day, phishing continues to rise as one of the greatest threats currently facing mobile devices. Our phones are quickly becoming our most important means of communication for our personal and professional lives, but as technology has become more advanced so too has the sophistication and frequency of phishing attacks.

Download Infographic

Case studies

Case Study: CanWel

Discover how CanWel, a leading distributor of building materials based in Canada, managed to achieve flat mobile internet bills and maximize employee productivity with Corrata’s Data Control Solution.

Download Case Study

Case Study: One Housing

See how Corrata’s Data Usage Control solution gave One Housing, a busy non-profit organization in the UK, the visibility and control needed over individual employee data usage to manage costs and reduce ‘bill shock’.

Download Case Study

Case Study: PROscape

Learn how Corrata helped American landscape company PROscape maximize employee productivity and safety and mitigate the risk of cyber attacks on their employee mobile devices. 

Download Case Study

Our blog

By Emma 16th January 2020

Zero Trust – That buzzword you keep hearing about explained

Zero Trust is the new ‘take no chances’ security system that businesses are switching to. Here’s everything you need to know. Zero Trust is probably a term you’ve come across multiple times in the last six to twelve months. The model was designed in 2010 by John Kindervag, a principal analyst of Forrester Research Inc. […]

Read more
By Emma 10th January 2020

Frost & Sullivan highlight Corrata in latest MTD research

“Corrata addresses product shortcomings of its main competitors” Corrata are delighted to be featured in the latest Frost & Sullivan European Mobile Threat Defense Market report. The 2019 report identifies and compares the core players commanding the mobile security sphere in Europe. Frost & Sullivan emphasize the uniqueness of Corrata’s technical solution by drawing attention […]

Read more
By Emma 9th January 2020

5 Top Trends for Mobile Cyber Security in 2020

The mobile security landscape is changing. Here are the trends you need to know in 2020. Mobile cyber security flooded headlines in 2019. Last year alone featured the Whatsapp Pegasus spyware attack, privacy concerns around aging app FaceApp, and the Strandhogg android vulnerability. We saw an increase in targeted spear-phishing attacks, multinational companies being hit […]

Read more