Free Trial

Briefing Notes

Why Google and Apple’s Malware Protection Might Not Be Good Enough

Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices.

Download Briefing Note

Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?

For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from the Apple App Store or Google Play Store.

Download Briefing Note

The Rising Threat of Social Media Phishing Attacks

Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world.

Download Briefing Note

How to protect against an iOS hack

Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The rate at which they are used for personal use, as well as business operations, make mobile devices especially vulnerable to attack.

Download Briefing Note

Public Wi-Fi: Stealing Secrets in the Sky

‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep your information safe when browsing online.

Download Briefing Note

Machine Learning: a New Frontier in Mobile Phishing Protection

An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution.

Download Briefing Note

3 Key Developments in Mobile Phishing That Every Organization Should Know

Phishing attacks are becoming more common and more difficult to spot. Understanding the evolving strategies of cyber criminals is crucial to staying protected from phishing attempts.

Download Briefing Note

Understanding Alternative Approaches to Device Security

Threats against mobile devices are increasing, putting companies' sensitive information at risk. Understand the pro's and con's of Mobile Threat Defence solutions and how Corrata's technology avoids these common MTD pitfalls.

Download Briefing Note

DNS over HTTPS – Anti-Phishing Solutions are going Dark

A breakdown of DNS Sniffing and how this solution to phishing will be affected by decisions to encrypt DNS traffic.

Download Briefing Note

Whitepapers

The Rise in Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Download Whitepaper

Today’s Mobile Threat Landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating systems, better enterprise support and the emergence of mature mobility management platforms. But significant and persistent mobile threats remain. The whitepaper explains the nature of these threats and the steps every enterprise needs to take to protect sensitive information in an ever-connected world.

Download Whitepaper

Enterprise Mobile Data Control

Enterprise mobile data consumption is growing at close to 100% annually and some analysts believe it will have increased tenfold by the end of the decade. Corrata’s Enterprise Mobility Control whitepaper explains why this is happening and what organizations need to do to manage the cost, productivity and risk implications of this data tsunami. Revised to include the impact of the end of EU roaming and Brexit.

Download Whitepaper

Infographics

Mobile Security Solution Review

While there are a range of tools aimed at thwarting mobile phone attacks available, their effectiveness against the latest cyber attacks is questionable. Let's examine how today's tools would have worked when confronted by a modern threat such as the recent WhatsApp Pegasus spyware hack.

Download Infographic

Get the Facts about Insecure Wi-Fi

Free Wi-Fi is a phrase so commonly heard today that we come to expect it in most public places. The vast majority of hotels, restaurants, coffee shops, and transport systems today offer some form of Wi-Fi network for guests and customers but are they always safe? Unencrypted internet traffic on public networks can easily be intercepted by hackers, putting our sensitive data at risk.

Download Infographic

The Mobile Phishing Threat

With over 46,000 new sites created every day, phishing continues to rise as one of the greatest threats currently facing mobile devices. Our phones are quickly becoming our most important means of communication for our personal and professional lives, but as technology has become more advanced so too has the sophistication and frequency of phishing attacks.

Download Infographic

Case studies

Case Study: Red Willow

Learn how non-profit organization Red Willow reduced the cost of their data control solution by 50% and eliminated the need for complicated device configurations by upgrading to Corrata.

Download Case Study

Case Study: MaxGen Energy

Read why MaxGen Energy chose Corrata for power and simplicity after trying complex APN based alternatives that proved clunky and challenging for end users.

Download Case Study

Case Study: CanWel

Discover how CanWel, a leading distributor of building materials based in Canada, managed to achieve flat mobile internet bills and maximize employee productivity with Corrata’s Data Control Solution.

Download Case Study

Case Study: One Housing

See how Corrata’s Data Usage Control solution gave One Housing, a busy non-profit organization in the UK, the visibility and control needed over individual employee data usage to manage costs and reduce ‘bill shock’.

Download Case Study

Case Study: PROscape

Learn how Corrata helped American landscape company PROscape maximize employee productivity and safety and mitigate the risk of cyber attacks on their employee mobile devices. 

Download Case Study

Our blog

By Emma 27th May 2020

Corrata joins forces with the Coalition Against Stalkerware

Corrata have become a member of the Coalition Against Stalkerware to combat the rising threat of stalkerware incidents Corrata are delighted to announce that we have become a member of the Coalition Against Stalkerware. The coalition is composed of non profit groups and IT organizations. Its purpose is to help victims of domestic abuse, stalking […]

Read more
By Emma 8th May 2020

The results are in – the top apps we’re using during lockdown

Mobile app usage: the winners, the losers and the newcomers I don’t know about you but the days of going to the cinema, restaurants, pubs… seem like a distant memory. As we continue to follow protocol by staying at home, we’ve had to find new ways of entertaining ourselves. Technology has played a major role […]

Read more
By Emma 7th April 2020

WhatsApp, Houseparty and Zoom – what’s all the fuss about?

WhatsApp, Houseparty and Zoom – why are they all making headlines of the wrong sort? Communication apps such as WhatsApp, Houseparty and Zoom have become extremely useful resources during the COVID-19 lockdown. As we practise social distancing, it’s comforting knowing we can video call our friends and family at the touch of a button. However, […]

Read more