IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
226 - 250 of 7240 Matches Previous Page  |  Next Page
5-min demo: Data Security
sponsored by Veeam Software
VIDEO: With modernized data protection, organizations can cut their average ransomware recovery cost down or not pay anything at all. How? Tune into this demo to learn how you can protect your data with immutability from Veeam.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Veeam Software

5th edition of the latest trends and insights for CIOs, CTOs and CDOs.
sponsored by ComputerWeekly.com
EGUIDE: Thie e-guide offers a collection of some of our most popular articles on issues faced by IT decision makers, such as how to get cloud implementations right and how and why men in the technology industry have helped women progress.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

ComputerWeekly.com

6 Key Identity and Access Management (IAM) Benefits
sponsored by BIO-key International
EGUIDE: Identity and access management (IAM) has become one of the most effective ways to provision, manage and secure access to an organizations sensitive data. In this e-guide, 6 Key Identity and Access Management (IAM) Benefits, discover 6 observable benefits that users, admins and organizations can realize with an effective IAM program.
Posted: 28 Oct 2020 | Published: 26 Oct 2020

BIO-key International

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

6 Reasons You Should Switch to Cloud-Based Patch Management
sponsored by Automox
RESOURCE: Traditional, on-premise patch management platforms were not designed to handle the evolved threats that exist today. With cloud-based agility, every piece of an organization receives critical security updates in a timely manner. Browse this guide to learn more on why cloud-based patch management makes for greater productivity and security.
Posted: 24 Aug 2020 | Published: 24 Aug 2020


6 Steps to Managed Services Success
sponsored by ConnectWise
WHITE PAPER: Making the switch to a managed services model isn’t quite so simple. If you’re considering becoming an MSP, these six steps can help. Read further to uncover all six and to learn how they apply to your organization.
Posted: 23 Sep 2020 | Published: 23 Sep 2020

ConnectWise

6 Steps to Securing Enterprise Data
sponsored by BigID
WHITE PAPER: Organizations of all sizes need a strong data-centric security policy. Start with these 6 key steps to secure sensitive and personal data across the enterprise.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

6 Ways to Accelerate and Derisk Migration to AWS
sponsored by AppDynamics
WHITE PAPER: Application performance management (APM) has taken center stage. With APM strategies, businesses can move quickly and securely to the cloud with consistent end-to-end application monitoring. Discover 6 ways to use APM to migrate to AWS in this guide.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

AppDynamics

5 Ways to Meet Today's Data Management Challenges with a Single Platform
sponsored by Commvault
WHITE PAPER: Using several point products leads to inefficiency and high TCO. Learn how integration brings security and flexibility.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Commvault

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

5 Ways to Reduce TCO with a Data Protection Appliance
sponsored by Commvault
WHITE PAPER: Read this paper to learn five ways a scale-out storage architecture can reduce your data protection and secondary storage total cost of ownership (TCO).
Posted: 23 Jan 2018 | Published: 23 Jan 2018

TOPICS:  IT Management
Commvault

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges

5 Ways Veritas Makes VMware vSphere Backup Rock!
sponsored by Veritas
WHITE PAPER: Learn five ways to simplify and transform the protection of your VMware physical and cloud environments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

5 Ways Veritas NetBackup 8 Makes Microsoft Hyper-VBackup Rock!
sponsored by Veritas
WHITE PAPER: Discover how to achieve near 100% backup and recovery success rates in a Hyper-V environment.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

6 Multi-Cloud Tool Necessities
sponsored by Cisco Systems, Inc.
ESSENTIAL GUIDE: In this E-Guide, discover how cloud management platforms (CMPs) and monitoring tools have evolved alongside the growing popularity of multi-cloud strategies – and what features IT teams should be looking for when choosing a CMP platform of their own.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Cisco Systems, Inc.

6 Policy Types For AWS Governance
sponsored by CloudHealth by VMware
EBOOK: This paper outlines several types of policies and examples that you must put in place to centralize governance across your Amazon Web Services (AWS) cloud environment.
Posted: 27 Nov 2018 | Published: 27 Nov 2018

TOPICS:  IT Management
CloudHealth by VMware

6 Questions to Ask SaaS E-Commerce Vendors
sponsored by Oracle Corporation
WHITE PAPER: Don't just look at bells and whistles. Learn strategic questions to ask that ensure you find the best partner in SaaS.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

6 Reasons to Boot Enterprise Servers From Enhanced SSD
sponsored by Micron Technology
WHITE PAPER: Choosing between HDD and SSD as you build your server? Find out how SSD creates better resiliency, lower costs and more.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

TOPICS:  IT Management
Micron Technology

6 Steps to Mastering Endpoint Protection
sponsored by McAfee, Inc.
WHITE PAPER: Let these six steps guide your company towards reliable protection to stay ahead of attackers.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

TOPICS:  IT Management
McAfee, Inc.

6 Steps to Prevent a Data Breach
sponsored by Symantec Corporation
BROCHURE: Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches.
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Symantec Corporation

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AT&T Cybersecurity

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Tomorrow's workloads will be even heavier than today's. Learn how to future-proof your server to scale as demand grows.
Posted: 11 Mar 2015 | Published: 31 Jan 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Symantec & Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Symantec & Blue Coat Systems

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.
226 - 250 of 7240 Matches Previous Page    8 9 10 11 12 13    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info