Crime often uses such phones

Description of your first forum.
Post Reply
Rakhiraqsdiwseo
Posts: 643
Joined: Sun Jan 19, 2025 7:57 am

Crime often uses such phones

Post by Rakhiraqsdiwseo »

— Because the phones that were found were bought in other countries and then imported to us. We won’t be able to track anything that way.

Unfortunately, organized . In the US, disposable phones are called "burners", borrowed from criminal slang. Burners are purchased prepaid for cash so that the police cannot track the owner by payment. Such a phone is turned on only once - immediately before the call. After that, it is considered "burned" - henceSASE comes to the defense of remote work
Maxim Belous | 04/22/2020
The concept of SD-WAN , a software-defined wide area network, is good and convenient. Sometimes even overly convenient: so much so that its active use begins to threaten the information security of the organization implementing this concept. Concerns in this regard are especially relevant against the backdrop of anti-coronavirus quarantine measures, when many companies around the world are forced to quickly organize distributed offices for dozens, hundreds and even thousands of employees sent home at once.

Accustomed to installing new benin mobile database on their smartphones at any and all occasions, domesticated (often against their will) employees are just as frivolous about the corporate laptops and tablets issued to them for a while. In the absence of a system administrator constantly keeping an eye on each PC, shadow IT is expanding and gaining strength - an area of ​​installation and active use of unauthorized software on work computers hidden from the eyes of IT and information security professionals. Which, of course, does not strengthen the overall level of confidentiality of corporate data traveling across the company's (now geographically distributed) network.

In fact, the information security issues that were previously systematically dealt with by IT specialists exclusively in large commercial structures with a developed branch network are now forced to be urgently resolved by system administrators of any company, at least some of whose employees have been transferred to remote work due to restrictions on movement due to the COVID-19 outbreak. Manual management of security policies in such a situation is almost impossible to implement. It's high time to start mastering a relatively new cloud service - SASE (pronounced as "sassy"; secure access service edge - providing services on the periphery with secure access).

the name) and thrown in the trash. Even if the burner is found, this will not help the investigation to find its owner or understand the connections between the criminals.
Post Reply