Items Tagged with "Policies and Procedures"


37d5f81e2277051bc17116221040d51c

Mobile Device Security in a BYOD World

January 29, 2013 Added by:Robert Siciliano

If you choose to use your personal device for employment purposes then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Privacy Scares from the Ghosts of Job Applicants Past

January 17, 2013 Added by:Rebecca Herold

There is a topic that has been coming up, over and over and over again over the past 12 years, that I’ve never seen addressed in other publications. What does your organization do with all the personal information you collect from job applicants? Consider a real situation I encountered around ten years ago...

Comments  (2)

1de705dde1cf97450678321cd77853d9

What's Next For BYOD - 2013 And Beyond

December 30, 2012 Added by:Ian Tibble

The business case is inconclusive, with plenty in the "say no to BYOD" camp. The security picture is without foundation - we have a security nightmare with user devices, regardless of who owns the things...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Prediction: BYOD May Go Away in 2013

December 25, 2012 Added by:Paul Kenyon

Considering this speed of change, taking a moment to reflect on the security risks ahead is not only prudent, but could save your organization from being blindsided. From my view, here's what I'd recommend organizations, from SMBs to the enterprise, prepare for in 2013...

Comments  (4)

Ff632049ba1218ecd55b8122b2112642

All Aboard

December 17, 2012 Added by:Randall Frietzsche

We need a well-conceived set of administrative and technical controls - our policy, while still acknowledging that every living creature on the planet is organically attached to a smart device, must dictate that the user will follow the policy at risk of termination...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media: Lightning Storm

December 03, 2012 Added by:Joel Harding

I worked for one company who wanted to get information out quickly to all their stakeholders. The problem was the company was mired in an unhealthy aversion to risk. Their mind-set was avoidance, whereas industry transitioned to risk mitigation. That company is doomed to fail...

Comments  (1)

5a8300df8aa4169096932e433ec884b5

BYOD savings may be lost by security and admin costs

November 12, 2012 Added by:Rainer Enders

Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Security and Privacy Concerns for Mobile Devices

November 11, 2012 Added by:Dan Dieterle

BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too. But there are some serious concerns about mobile devices...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Costs are Rising

November 11, 2012 Added by:Bill Gerneglia

Recent research demonstrates some of the quantifiable benefits and complexities associated with allowing employees to use their own mobile devices on their employers' networks. Most organizations are now enabling BYOD in the enterprise...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Third Party Application Analysis: Best Practices and Lessons Learned

November 02, 2012 Added by:Fergal Glynn

Communication and execution are crucial to successful third party analyses. A huge contributing factor for these best practices is project management. Project management activities such as status meetings, enterprise follow-ups, and open discussions will facilitate the analysis process...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

iPhone Mania and Your Corporate Security

November 01, 2012 Added by:Tripwire Inc

With the release of the iPhone 5 the proliferation of personal smart phones into the enterprise will get even faster. With projected sales between 5 and 8 million iPhones through the holidays you can guarantee that a fairly large percentage of them will be added to the burdens of the corporate network...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD or Rogue IT?

October 22, 2012 Added by:Bill Gerneglia

Rogue IT is the name given to the informal, ad hoc software and electronic devices brought by employees into their workplace. If IT managers are warming up to and in fact embracing BYOD are they as accepting of Rogue IT in the office? Is Rogue IT simply an extension of BYOD?

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Employers Must Consider Social Media Risks

October 17, 2012 Added by:David Navetta

One should assume that any information purportedly protected by privacy settings could still be viewed by strangers. And t is difficult to authenticate “friends” on a social network – they may be impersonators looking to scrape sensitive information from the ”private” online posts...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Four Best Practices for BYOD Policies

October 16, 2012 Added by:Robert Siciliano

Bringing your own device is not a right but a privilege. If your employer doesn’t allow it there is generally a good reason. Data breaches cost thousands and in some cases millions. So if you are lucky enough to be privileged, protect that mobile device with the guidance of the IT department...

Comments  (1)

7e364bbac217114a59e547b354e7f7ad

Network Design, Wireless Security, and Password Policies - Business Beware

October 15, 2012 Added by:Gary McCully

A while back I was on a wireless assessment in which I was able to compromise the client’s primary Windows Domain from their guest wireless network. My hope in writing this article is that organizations will take their network design, wireless security, and password policies a little more seriously...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Six Questions to Ask Before Posting to Social Networks

October 10, 2012 Added by:Rebecca Herold

Every day I see yet another situation where employees misused, abused or otherwise accused social media sites to the chagrin of their employers. Businesses need to make a coordinated effort, using a combination of policies, training and technology to mitigate the risks of workers using social media sites...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »