Posts by Arieanna Schweber :

Arieanna Schweber has been a part of the Absolute writing team since 2007. Arieanna was Canada's first female professional blogger and has been professionally blogging since 2006 and has spoken at leading blogging conferences including BlogHer and Northern Voice. Arieanna has a joint degree in Business and Communications from Simon Fraser University and continues to build communities for Vancouver-based clients.
BYOD Policy: Shaped by the Data Not the Device
BYOD Policy: Shaped by the Data Not the Device

When it comes to your BYOD policy, it’s time to stop thinking about the device and start thinking about the data. As summarized by Absolute Software’s CEO John Livingston for SiliconANGLE, setting up separate policies based on device type (phone, tablet, portable media, laptop, desktop) is both an “inefficient and expensive experience.” A typical employee will use many different device types which can leave IT trying to juggle too many...

READ MORE
Kids Twice as Likely to be Mobile Theft Victims in England
Kids Twice as Likely to be Mobile Theft Victims in England

The Crime Survey for England and Wales (CSEW) for 2011/2012 show that mobile theft affected more than 826,000 people in the 12 month period with teens and youth aged 14-24 more than twice as likely to be victims of mobile theft as other age groups. The full stats, as discussed here, indicate that almost half (46%) of theft from the person and robbery incidents involved theft of a mobile phone, up from 31% in...

READ MORE
HIPAA Security Risks in the Cloud

As hospitals migrate electronic patient health information (ePHI) from strictly in-house servers to cloud hosting solutions, the safeguarding of protected health information take on added complexity. In order to comply with HIPAA and the Hitech Acts, healthcare organizations need to be aware of the added risks associated with electronic medical records and cloud services. CloudTweaks recently put together a list of the Top 5 HIPAA Security Risks: Theft of...

READ MORE
What is Remote Data Delete? New Video
What is Remote Data Delete? New Video

If a device is at risk, then so is the data it contains. Even if you believe the data is safe, when it comes to regulations and corporate liability, you need to be able to prove it. Absolute Data & Device Security (DDS) customers use the Data Delete Audit Report as the IT response protocol, allowing them to prove the data on a device at risk has been deleted. During the...

READ MORE
Recovery: It's About More than a Returned Device

In our work successfully recovering over 29,000 lost and stolen devices, we have learned a lot about what it means to RECOVER from device theft. We have learned that recovery is not just about returning a device, but recovering from the loss incident itself. In the enterprise setting, this means addressing security gaps, providing additional employee training, understanding crime trends, reputation management, and even addressing the emotional component of...

READ MORE