Blog Posts Tagged with "BYOD"
May 07, 2013 Added by:Rick Comeau
While some of the cyber attacks making news lately are the result of sophisticated methods, many are not: they often take advantage of a lack of basic security protections. Let’s take a look at seven “sins” that organizations and users are committing that are leaving them vulnerable.
April 15, 2013 Added by:Patrick Oliver Graf
One drawback of BYOD is that each mobile operating system comes with its own architecture and security concerns. Any company that embraces BYOD and mobile technologies must account for the different platforms its employees use to complete work-related functions.
March 13, 2013 Added by:Allan Pratt, MBA
Today, the world of mobile devices includes smartphones and tablets. This post doesn’t favor any specific brands, but let’s agree that the industry leaders are iOS and Android devices. The jury is still out as to whether or not BlackBerry will become a contender.
March 08, 2013 Added by:Michelle Drolet
t appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls.
February 11, 2013 Added by:Brandon Knight
In the third, and last, installment in the Mobile App Security Series, we will be taking a look at some common flaws found in the way that mobile apps, or more accurately, the backend services which support them, perform authentication.
January 31, 2013 Added by:Robert Siciliano
With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...
January 29, 2013 Added by:Robert Siciliano
If you choose to use your personal device for employment purposes then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data...
December 29, 2012 Added by:Paul Kenyon
With technology now available that allows even a true administrator to log in with standard user rights and do their role without ever needing a privilege account, we will start to see more and more organizations adopt a least privilege approach to computing...
December 26, 2012 Added by:Simon Moffatt
Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...
December 25, 2012 Added by:Paul Kenyon
Considering this speed of change, taking a moment to reflect on the security risks ahead is not only prudent, but could save your organization from being blindsided. From my view, here's what I'd recommend organizations, from SMBs to the enterprise, prepare for in 2013...
November 24, 2012 Added by:Fergal Glynn
No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security...
November 12, 2012 Added by:Rainer Enders
Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...
November 11, 2012 Added by:Dan Dieterle
BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too. But there are some serious concerns about mobile devices...
November 11, 2012 Added by:Bill Gerneglia
Recent research demonstrates some of the quantifiable benefits and complexities associated with allowing employees to use their own mobile devices on their employers' networks. Most organizations are now enabling BYOD in the enterprise...
November 01, 2012 Added by:Tripwire Inc
With the release of the iPhone 5 the proliferation of personal smart phones into the enterprise will get even faster. With projected sales between 5 and 8 million iPhones through the holidays you can guarantee that a fairly large percentage of them will be added to the burdens of the corporate network...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013