Business Solutions
With the introduction of new technologies like powerful smartphones and Office 365, potential victims are no longer using single endpoints but rather several fully connected devices and services, introducing a whole new environment in which victims are exposed to more attack vectors. In the first half of 2018, we have witnessed an interesting trend – preinstalled malware on endpoint devices.