BYOD

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Data Security: Is the Endpoint Safer than the Cloud?
Data Security: Is the Endpoint Safer than the Cloud?

Former security contractor and former CIA and NSA employee Edward Snowden recently leaked secret documents revealing that the National Security Agency (NSA) in the US has been working with technology companies to weaken encryption standards and has been using programs to intercept telephone metadata and surveil the Internet. While discussions could be had on topics such as whistle blowing, surveillance, government secrecy and national security, the key takeaway for businesses...

READ MORE
Going Mobile in the Public Sector: How to Keep Data Safe
Going Mobile in the Public Sector: How to Keep Data Safe

How is the public sector protecting mobile data? I recently answered this question in a post on The Information Daily, examining the benefits and risks that come alongside a paperless environment. When data moves from being physically bound – on network, on paper, on solid storage devices – to virtual and mobile to any device endorsed to access it, all of these endpoints become a potential security breach. With reported...

READ MORE
10 Mobile Security Myths
10 Mobile Security Myths

CRN recently put together a slideshow outlining “10 Mobile Security, BYOD Privacy And Security Myths“, a list that reflects the challenges that companies are facing with data security, privacy, and device theft particularly in light of BYOD. The 10 *myths* listed include: User privacy is invaded by BYOD management (the right MDM is not invasive!) Malware is the most significant threat to mobile data (nope! Lost or stolen devices...

READ MORE
Supporting iOS7 in the Enterprise
Supporting iOS7 in the Enterprise

September 18, 2013 marks the official release of Apple’s iOS7; if your enterprise supports iOS devices (iPhones, iPads), whether corporate-owned or BYOD, IT needs to be prepared for effectively rolling out iOS7. I spoke with Tech Republic about 7 Tips for Supporting iOS7 in the Enterprise. Detailed in full on Tech Republic, these 7 tips include: Use Apple IDs for BYOD, allowing enterprise the ability to purchase business apps through...

READ MORE
Protecting Healthcare Data in a BYOD World
Protecting Healthcare Data in a BYOD World

In our recent healthcare survey, we found that 61% of hospital and health systems have at least 50% of their employees using mobile devices for work. Although BYOD devices are being used by hospitals, with 36% of these accessing protected health information (PHI), 63% of these healthcare organizations do not have a formal policy for BYOD. Our survey revealed that the top concerns about mobile devices are regulatory non-compliance,...

READ MORE