That tiny chip buried deep in smartphones, which requires a pin-like device to remove, might seem securely locked away. But the lack of physical access to SIM cards doesn’t make them immune…
![](https://redherring.wpenginepowered.com/wp-content/uploads/2017/07/SIM-Card-150x150.jpeg)
![](https://redherring.wpenginepowered.com/wp-content/uploads/2017/07/SIM-Card.jpeg)
THE BUSINESS OF TECHNOLOGY
That tiny chip buried deep in smartphones, which requires a pin-like device to remove, might seem securely locked away. But the lack of physical access to SIM cards doesn’t make them immune…
Keeping corporate data safe is a constant challenge for many security professionals. Deploying the most rigorous security stack–including firewalls, intrusion prevention systems, network monitors, data encryption, two factor authentication, anti-virus software and…