Blog Posts Tagged with "BYOD"

A7a839ae03fd6cee0c4b6b7ff67127e9

What bicycle thefts can teach us about mobile security

February 17, 2017 Added by:Avi Rosen

Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

August 05, 2014 Added by:Patrick Oliver Graf

Thanks to what some say are restrictive Bring-Your-Own-Device (BYOD) and remote access policies, some mobile devices users in the corporate world are rebelling against BYOD – specifically, they don’t want their personal mobile devices to be controlled by their employer’s IT administrators.

Comments  (0)

682e0e796084e163c5ca053dd8573b0c

Is BYOD Security Really Concerned with Safety – or Is It About Control?

July 14, 2014 Added by:Eric Byres

As SCADA security professionals we need to pick our security battles carefully. I will be looking deeper into the real goals of any SCADA security policy or technology I am exposed to. Is it really helping make SCADA and ICS safer? Or is it just a way to make control easier? Is it addressing the real risks? Or is it just for show?

Comments  (0)

Ec47f9657c90a6db70e5e4f1cd1f7a02

The Struggle to Secure the New IT

June 16, 2014 Added by:Gretchen Hellman

Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Will Network Security Concerns Sink Government BYOD?

June 11, 2014 Added by:Patrick Oliver Graf

Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

BYOD and Its Risks to Network Security

June 05, 2014 Added by:Patrick Oliver Graf

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

BYOD, Policy Compliance Top Remote Access Concerns at Interop New York 2013

October 15, 2013 Added by:Patrick Oliver Graf

Many Interop vendors and experts agree that enterprises are relying on third-party service providers more than ever before. Businesses are acknowledging the growing prominence of trends including BYOD and the cloud, and are trying to be more flexible in terms of what applications, operating systems and devices they are supporting.

Comments  (0)

315d342a55586593b3fbe9740f5ecff5

Seven “Sins” of Cyber Security

May 07, 2013 Added by:Rick Comeau

While some of the cyber attacks making news lately are the result of sophisticated methods, many are not: they often take advantage of a lack of basic security protections. Let’s take a look at seven “sins” that organizations and users are committing that are leaving them vulnerable.

Comments  (25)

E595c1d49bf4a26f8e14ce59812af80e

VPNs and Common-Sense Policies Make BYOD Safer

April 15, 2013 Added by:Patrick Oliver Graf

One drawback of BYOD is that each mobile operating system comes with its own architecture and security concerns. Any company that embraces BYOD and mobile technologies must account for the different platforms its employees use to complete work-related functions.

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

How Secure Is Your Mobile Device?

March 13, 2013 Added by:Allan Pratt, MBA

Today, the world of mobile devices includes smartphones and tablets. This post doesn’t favor any specific brands, but let’s agree that the industry leaders are iOS and Android devices. The jury is still out as to whether or not BlackBerry will become a contender.

Comments  (1)

E85787adcaf7bca10e799cfd1cfd08f1

BYOD is Here to Stay. Take Device Lifecycle Into Account.

March 08, 2013 Added by:Michelle Drolet

t appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls.

Comments  (1)

4eb356e09746aadc2f4800877e8c24e8

Mobile App Security Series: Common Failures With User Authentication

February 11, 2013 Added by:Brandon Knight

In the third, and last, installment in the Mobile App Security Series, we will be taking a look at some common flaws found in the way that mobile apps, or more accurately, the backend services which support them, perform authentication.

Comments  (0)

37d5f81e2277051bc17116221040d51c

What’s on Your Phone? A Lot More than You Realize

January 31, 2013 Added by:Robert Siciliano

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Device Security in a BYOD World

January 29, 2013 Added by:Robert Siciliano

If you choose to use your personal device for employment purposes then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data...

Comments  (0)

1de705dde1cf97450678321cd77853d9

What's Next For BYOD - 2013 And Beyond

December 30, 2012 Added by:Ian Tibble

The business case is inconclusive, with plenty in the "say no to BYOD" camp. The security picture is without foundation - we have a security nightmare with user devices, regardless of who owns the things...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »