Executive management approved the storage of sensitive data on smartphones and tablets as long as they were encrypted. Later a vulnerability was announced at an information security conference that allowed attackers to bypass the device's authentication process, making the data accessible. The smartphone manufacturer said it would take six months for the vulnerability to be fixed and distributed through the cellular carriers. Four months after the vulnerability was announced, an employee lost his tablet and the sensitive information became public.
What was the failure that led to the information being lost?
Yvette
1 months agoAlva
2 months agoMadalyn
4 days agoAmie
6 days agoAlyce
12 days agoSelene
13 days agoCecily
22 days agoOlen
26 days agoDona
26 days agoClaudia
2 months agoElvis
14 days agoQuentin
1 months agoSherill
2 months agoAdell
2 months agoRanee
2 months agoJean
3 months agoBecky
3 months agoTricia
1 months agoAnnice
1 months agoErick
2 months agoBambi
2 months agoElin
3 months agoClaudia
3 months agoDalene
3 months ago