Blog Posts Tagged with "BYOD"

942a200514c2a9d79858ce6355c40614

Executive Viewpoint 2013: Avecto

December 29, 2012 Added by:Paul Kenyon

With technology now available that allows even a true administrator to log in with standard user rights and do their role without ever needing a privilege account, we will start to see more and more organizations adopt a least privilege approach to computing...

Comments  (1)

65c1700fde3e9a94cc060a7e3777287c

The Obligatory 2013 Infosec Predictions Post

December 26, 2012 Added by:Simon Moffatt

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Prediction: BYOD May Go Away in 2013

December 25, 2012 Added by:Paul Kenyon

Considering this speed of change, taking a moment to reflect on the security risks ahead is not only prudent, but could save your organization from being blindsided. From my view, here's what I'd recommend organizations, from SMBs to the enterprise, prepare for in 2013...

Comments  (4)

68b48711426f3b082ab24e5746a66b36

Why You Should Care About Mobile Security: An Infographic

November 24, 2012 Added by:Fergal Glynn

No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security...

Comments  (2)

5a8300df8aa4169096932e433ec884b5

BYOD savings may be lost by security and admin costs

November 12, 2012 Added by:Rainer Enders

Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Security and Privacy Concerns for Mobile Devices

November 11, 2012 Added by:Dan Dieterle

BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too. But there are some serious concerns about mobile devices...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Costs are Rising

November 11, 2012 Added by:Bill Gerneglia

Recent research demonstrates some of the quantifiable benefits and complexities associated with allowing employees to use their own mobile devices on their employers' networks. Most organizations are now enabling BYOD in the enterprise...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

iPhone Mania and Your Corporate Security

November 01, 2012 Added by:Tripwire Inc

With the release of the iPhone 5 the proliferation of personal smart phones into the enterprise will get even faster. With projected sales between 5 and 8 million iPhones through the holidays you can guarantee that a fairly large percentage of them will be added to the burdens of the corporate network...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD or Rogue IT?

October 22, 2012 Added by:Bill Gerneglia

Rogue IT is the name given to the informal, ad hoc software and electronic devices brought by employees into their workplace. If IT managers are warming up to and in fact embracing BYOD are they as accepting of Rogue IT in the office? Is Rogue IT simply an extension of BYOD?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Four Best Practices for BYOD Policies

October 16, 2012 Added by:Robert Siciliano

Bringing your own device is not a right but a privilege. If your employer doesn’t allow it there is generally a good reason. Data breaches cost thousands and in some cases millions. So if you are lucky enough to be privileged, protect that mobile device with the guidance of the IT department...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Mobile Security: Tips for Using Personal Devices at Work

October 08, 2012 Added by:Robert Siciliano

If you as an employee of a hospital use your personal device at work and also use it outside of work and it gets lost or stolen, then YES, you and the hospital would be in a great deal of hot water in the event that mobile device was lost...

Comments  (25)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Trend Grows as Security Issues Escalate

October 07, 2012 Added by:Bill Gerneglia

The report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Federal CIO Council Releases BYOD Toolkit

September 19, 2012 Added by:David Navetta

The BYOD movement, barring a black swan event, is likely to continue to gather steam – though not without detractors. And as the Toolkit notes, BYOD remains a nascent movement with real concerns and numerous issues to be worked through, along with the establishment of new practices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

BYOD: Mobile Security Tips for Small Businesses

September 16, 2012 Added by:Robert Siciliano

If you choose to use your personal device for work purposes, at any time, for any reason, your employer will more than likely want control over that device. This means that, again, your employer may have remote capabilities to monitor activity wipe your device’s data...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Will the Rise of Tablets Affect Security Measures in the Workplace?

September 11, 2012 Added by:Robert Siciliano

While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Data Mobility and Security Biggest Cloud Computing Concern

September 10, 2012 Added by:Bill Gerneglia

BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »