Free Trial

Briefing Notes

Why Google and Apple’s Malware Protection Might Not Be Good Enough

Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices.

Download Briefing Note

Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?

For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from the Apple App Store or Google Play Store.

Download Briefing Note

The Rising Threat of Social Media Phishing Attacks

Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world.

Download Briefing Note

How to protect against an iOS hack

Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The rate at which they are used for personal use, as well as business operations, make mobile devices especially vulnerable to attack.

Download Briefing Note

Public Wi-Fi: Stealing Secrets in the Sky

‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep your information safe when browsing online.

Download Briefing Note

Machine Learning: a New Frontier in Mobile Phishing Protection

An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution.

Download Briefing Note

3 Key Developments in Mobile Phishing That Every Organization Should Know

Phishing attacks are becoming more common and more difficult to spot. Understanding the evolving strategies of cyber criminals is crucial to staying protected from phishing attempts.

Download Briefing Note

Understanding Alternative Approaches to Device Security

Threats against mobile devices are increasing, putting companies' sensitive information at risk. Understand the pro's and con's of Mobile Threat Defence solutions and how Corrata's technology avoids these common MTD pitfalls.

Download Briefing Note

DNS over HTTPS – Anti-Phishing Solutions are going Dark

A breakdown of DNS Sniffing and how this solution to phishing will be affected by decisions to encrypt DNS traffic.

Download Briefing Note


Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps, to steal information from users. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Download Whitepaper

Today’s Mobile Threat Landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating systems, better enterprise support and the emergence of mature mobility management platforms. But significant and persistent mobile threats remain. The whitepaper explains the nature of these threats and the steps every enterprise needs to take to protect sensitive information in an ever-connected world.

Download Whitepaper

Enterprise Mobile Data Control

Enterprise mobile data consumption is growing at close to 100% annually and some analysts believe it will have increased tenfold by the end of the decade. Corrata’s Enterprise Mobility Control whitepaper explains why this is happening and what organizations need to do to manage the cost, productivity and risk implications of this data tsunami. Revised to include the impact of the end of EU roaming and Brexit.

Download Whitepaper


Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's examine how today's tools would have worked when confronted by a modern threat such as the recent WhatsApp Pegasus spyware hack.

Download Infographic

Get the Facts about Insecure Wi-Fi

Free Wi-Fi is a phrase so commonly heard today that we come to expect it in most public places. The vast majority of hotels, restaurants, coffee shops, and transport systems today offer some form of Wi-Fi network for guests and customers but are they always safe? Unencrypted internet traffic on public networks can easily be intercepted by hackers, putting our sensitive data at risk.

Download Infographic

The Mobile Phishing Threat

With over 46,000 new sites created every day, phishing continues to rise as one of the greatest threats currently facing mobile devices. Our phones are quickly becoming our most important means of communication for our personal and professional lives, but as technology has become more advanced so too has the sophistication and frequency of phishing attacks.

Download Infographic

Case studies

Case Study: One Housing

See how Corrata’s Data Usage Control solution gave One Housing, a busy non-profit organization in the UK, the visibility and control needed over individual employee data usage to manage costs and reduce ‘bill shock’.

Download Case Study

Case Study: OFM Solutions

Discover why OFM Solutions, an accounting and financial services firm based in Dublin, needed to secure their entire mobile fleet and ensure that sensitive client information was always protected and how Corrata helped them to achieve this.

Download Case Study

Case Study: GemPool

Learn how leading Irish recruitment firm GemPool mitigated the risk of cyber attack or data leakage on their employee mobile devices and gained the confidence to work quickly and remotely without taking risks, with Corrata’s Internet Security Solution.

Download Case Study

Our blog

By Emma 25th November 2019

Does iOS Jailbreak Checkra1n pose a serious security risk?

Everything you need to know about Checkra1n, the latest jailbreak for iOS. What is jailbreaking?  The process of jailbreaking (also known as ‘rooting’ for Android) involves using 3rd party software to ‘unlock’ an iOS device such as an iPhone or iPad. This code overwrites the device’s software by removing the built in DRM (Digital Right […]

Read more
By Emma 6th November 2019

Corrata Confidential: The 3 benefits of a Zero Gateway Solution

Zero Gateway ensures device performance, employee privacy and company confidentiality One of the coolest things about Corrata is that that we are zero gateway. This means that we implement control over internet traffic at the device level. Unlike other providers, we avoid the traditional approach of routing all the traffic through a cloud gateway. By […]

Read more
By Emma 22nd October 2019

Time to Update your Mobile Phone Policy?

Corrata gives you some ideas about updating your organization’s mobile phone policy Policies Designed for the Past Today, most companies have some sort of policy covering mobile phone use. But in reality, many of these mobile phone policies date from an earlier era, one when mobile meant Blackberry or Nokia and most of what we […]

Read more