Blog Posts Tagged with "BYOD"
Securing the BYoD Workplace
November 28, 2018 Added by:Scott Gordon
A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.
Comments (0)
What bicycle thefts can teach us about mobile security
February 17, 2017 Added by:Avi Rosen
Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.
Comments (0)
Who Will Foot the Bill for BYOD?
September 10, 2014 Added by:Patrick Oliver Graf
The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...
Comments (0)
Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader
August 05, 2014 Added by:Patrick Oliver Graf
Thanks to what some say are restrictive Bring-Your-Own-Device (BYOD) and remote access policies, some mobile devices users in the corporate world are rebelling against BYOD – specifically, they don’t want their personal mobile devices to be controlled by their employer’s IT administrators.
Comments (0)
Is BYOD Security Really Concerned with Safety – or Is It About Control?
July 14, 2014 Added by:Eric Byres
As SCADA security professionals we need to pick our security battles carefully. I will be looking deeper into the real goals of any SCADA security policy or technology I am exposed to. Is it really helping make SCADA and ICS safer? Or is it just a way to make control easier? Is it addressing the real risks? Or is it just for show?
Comments (0)
The Struggle to Secure the New IT
June 16, 2014 Added by:Gretchen Hellman
Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.
Comments (0)
Will Network Security Concerns Sink Government BYOD?
June 11, 2014 Added by:Patrick Oliver Graf
Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”
Comments (0)
BYOD and Its Risks to Network Security
June 05, 2014 Added by:Patrick Oliver Graf
In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.
Comments (1)
BYOD, Policy Compliance Top Remote Access Concerns at Interop New York 2013
October 15, 2013 Added by:Patrick Oliver Graf
Many Interop vendors and experts agree that enterprises are relying on third-party service providers more than ever before. Businesses are acknowledging the growing prominence of trends including BYOD and the cloud, and are trying to be more flexible in terms of what applications, operating systems and devices they are supporting.
Comments (0)
Seven “Sins” of Cyber Security
May 07, 2013 Added by:Rick Comeau
While some of the cyber attacks making news lately are the result of sophisticated methods, many are not: they often take advantage of a lack of basic security protections. Let’s take a look at seven “sins” that organizations and users are committing that are leaving them vulnerable.
Comments (25)
VPNs and Common-Sense Policies Make BYOD Safer
April 15, 2013 Added by:Patrick Oliver Graf
One drawback of BYOD is that each mobile operating system comes with its own architecture and security concerns. Any company that embraces BYOD and mobile technologies must account for the different platforms its employees use to complete work-related functions.
Comments (1)
How Secure Is Your Mobile Device?
March 13, 2013 Added by:Allan Pratt, MBA
Today, the world of mobile devices includes smartphones and tablets. This post doesn’t favor any specific brands, but let’s agree that the industry leaders are iOS and Android devices. The jury is still out as to whether or not BlackBerry will become a contender.
Comments (1)
BYOD is Here to Stay. Take Device Lifecycle Into Account.
March 08, 2013 Added by:Michelle Drolet
t appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls.
Comments (1)
Mobile App Security Series: Common Failures With User Authentication
February 11, 2013 Added by:Brandon Knight
In the third, and last, installment in the Mobile App Security Series, we will be taking a look at some common flaws found in the way that mobile apps, or more accurately, the backend services which support them, perform authentication.
Comments (0)
What’s on Your Phone? A Lot More than You Realize
January 31, 2013 Added by:Robert Siciliano
With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...
Comments (0)
Mobile Device Security in a BYOD World
January 29, 2013 Added by:Robert Siciliano
If you choose to use your personal device for employment purposes then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data...
Comments (0)
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them
- Four Technologies that will Increase Cybersecurity Risk in 2019
- Strategies for Winning the Application Security Vulnerability Arms Race