G Data Software

G Data Software to Interop Attendees: Be Safe When Using Free WiFi on the Floor

Offers Tips for Safeguarding Confidential Information from Mobile Devices

 

Durham, NC -- (SBWIRE) -- 05/09/2011 -- With cyber-crime on the rise, tradeshows such as Interop, Las Vegas, are increasingly becoming a target for data thieves. G Data Software, one of the world’s first antivirus providers, offers attendees to this years’ show tips on how to keep confidential company information protected from such attacks. By following these free tips, attendees can safely use the free WiFi during the show without worry over any security threats.

"The trade in stolen data is an extremely lucrative business for cyber-criminals, and high tech events such as Interop can become profitable business trips for data thieves," said Ed Johnson, senior vice president, G Data Software. “There is often a great deal of valuable company data stored on the devices brought to these shows, so it’s important to protect yourself against attacks. We wanted to offer these tips to help those attendees who use the internet remain savvy to scams which may have otherwise gone unnoticed.”

Tips for Attendees

1. Hotspot or Hot Water?
Data thieves can pose as WiFi hotspots for a minimal outlay, choosing whatever name they want. Data transferred through these WiFi hotspots are done so without encryption and can be easily recorded by perpetrators. To avoid any issues, make sure to use a secure VPN tunnel or a UMTS connection, which make it harder to record and steal data.

2. Blog Smart
Bloggers should be sure to use a secure HTTPS connection when connecting to a server, and those with mobile devices such as tablet PCs, notebooks or smartphones, should deactivate their Bluetooth to prevent targeted access.

3. Accidents Happen, so Be Prepared
Losing a laptop or smartphone is painful, especially if private or commercial data falls into the wrong hands. To avoid this scenario, attendees can use an effective software package to encrypt all critical data, even for information stored on USB sticks and hard disks. The data then remains protected and inaccessible if the device is lost or subject to a targeted attack.

4. Have a Backup Plan
Effective data protection begins by being prepared and backing up all critical data. By doing so, users can install the backed-up data and files on a new device with little effort when they get back.

5. Boogiemen Do Exist
Whether on the road or in the office, using an effective malware security solution to protect your mobile device is essential. The latest smartphones such as the Android devices are beginning to be targeted by hackers. As a general rule, users should always keep their system fully up-to-date and install program updates and security patches.

G Data invites you to visit their Interop microsite for updates on the latest show news and happenings: http://www.gdata.de/mobile/interop/

About G Data Software, Inc.
Founded in 1985, G Data Software is one of the world’s first antivirus providers, with offices and distribution in more than 90 countries worldwide. The company provides proven enterprise and consumer security solutions, including antivirus, anti-spyware, anti-phishing, and firewall software. In addition to products, G Data Software runs a world-class malware research lab, Security Labs, which monitors and analyzes current computing threats on a global basis, partnering with organizations, governments and nonprofits to fulfil a variety of needs. The company has recently established operations in North America, located in the heart of Research Triangle Park, North Carolina. For more information on G Data Software, its products, or Security Labs, visit http://www.gdata-software.com

Press contacts
G Data Software
Eric Seymour / Aarti Shah
Phone: 617-960-9856 / 9878
Email: gdata@marchpr.com
Web: http://www.gdata-software.com