On the streets of Hong Kong, a notable trend is emerging in response to mobile-based cybersecurity concerns. Individuals and employees are increasingly adopting 'burner phones' - secondary mobile devices used to discreetly handle sensitive communications and transactions. This is no quirky tech trend however, it reflects increasingly widespread concerns about the ability of network operators to protect against intrusions, exfiltration of data, and exploitation of unauthorized access by threat actors.
The Changing Face of Cybersecurity in Hong Kong
The advent of such concerns brings with it a new level of complexity for companies – and individuals – doing business in Hong Kong. This has had a notable impact on how companies, both local and international, structure their own data security and privacy policies. The challenge lies in navigating this new terrain where the lines between safeguarding individual privacy, company data confidentiality, and national security appear increasingly blurred.
The Emergence of ‘Burner Phones’ as a Defensive Measure
Esta historia es de la edición February 2024 de Bisinfotech.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 8500 revistas y periódicos.
Ya eres suscriptor ? Conectar
Esta historia es de la edición February 2024 de Bisinfotech.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 8500 revistas y periódicos.
Ya eres suscriptor? Conectar
Wialon's Evolution and Innovations in Fleet Management and IoT
Wialon is the platform for fleet management and IoT, with 3.8 million connected vehicles in more than 150 countries.
Green Technology Innovations: Sustainable solutions for a greener planet
Rapid Industrialization since the last century has helped shape the world as we know it today.
Next-gen commercial EVs - how to solve the advanced charging challenge
Three scenarios with dedicated power electronic solutions
Cybersecurity in the Age of Digital Transformation: Strategies for Protecting Data and Privacy
In an era where digital transformation is not just an option but a necessity, the evolution of technology brings unprecedented challenges in maintaining data security and privacy.
Softing Industrial Elevates Connectivity with MQTT Protocol
The Secure Integration Server (SIS) from Softing Industrial now supports the MQTT protocol.
MediaTek Introduces T300 5G RedCap for IoT
MediaTek has announced the latest addition to its 5G RedCap portfolio, the MediaTek T300 platform for IoT applications, at MWC 2024.
Microchip Unveils 3.3 KV XIFM mSiC Gate Driver
Microchip Technology has introduces the 3.3 kVXIFM plug-and-play mSiC\" gate driver with patented Augmented Switching\" technology, which is designed to work out-of-the-box with preconfigured module settings to significantly reduce design and evaluation time.
Infineon Sells Sites in Philippines & South Korea to ASE
Infineon Technologies AG and ASE Technology Holding Co has announced that definitive agreements were signed under which Infineon will sell two backend manufacturing sites, one in Cavite, Philippines and one in Cheonan, South Korea, to two fully owned subsidiaries of ASE, a leading provider of independent semiconductor manufacturing services in assembly and test.
NeoCortec Signs Global Distribution Deal with DigiKey
NeoCortec has recently extended its network of distributors by signing a new global distribution agreement with DigiKey, a USA-based market leader and constant innovator in the worldwide distribution of high-service electronic components and automation products.
iOPEX Technologies Securing Sensitive Data and Safeguarding Against Cyber Threats
IOPEX transforms and optimizes work to flow with less friction while using digital engineering capabilities in automation & AI, coupled with rigorous operational discipline which significantly improves customer experience, economic gains, and business insights.