BYOD

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

BYOD in K-12 to Hit 20% by End of 2015
BYOD in K-12 to Hit 20% by End of 2015

According to a preview of the upcoming 2015 K-12 Horizon Report, it is forecasted that 20% of US classrooms will have implemented BYOD programs by the end of 2015, a marker or ‘mainstream’ status for BYOD. It’s anticipated that the K-12 space will see further impact from trends such as 3D printing, adaptive software and wearable technologies in the next few years.

READ MORE
Nearly 60% of UK Workers Using BYOD Outside IT Control
Nearly 60% of UK Workers Using BYOD Outside IT Control

Although some recent reports have been trying to downplay the “mobile threat” by saying mobile malware has not been a significant contributor to data breaches. This simplifies the mobile problem over much, unfortunately, assuming that malware is the only threat vector on a mobile device. In reality, mobility amplifies the risk to data breach from many angles.

READ MORE
Email Policies: A Critical Piece of Your Security Net
Email Policies: A Critical Piece of Your Security Net

The recent disclosures over former Secretary of State Hillary Clinton using a private email server for all communication offers an opportunity to review corporate policies regarding email use and security best practices. Unfortunately for corporate information security, this is not an unusual situation. When deploying data loss prevention systems, it is common to find users either forwarding their corporate email to non-company servers, or sharing confidential email contents inappropriately.

READ MORE
BYOD and Cloud Increase Data Breach Potential & Force Paradigm Shift
BYOD and Cloud Increase Data Breach Potential & Force Paradigm Shift

Wisegate, a crowdsource IT advisory and research group, recently conducted a survey of senior IT professionals on the state of IT security. The results of this survey, shared on CSO Online, show that BYOD and the cloud are having the greatest impact on IT security planning, forcing a shift from protecting devices to protecting data.

READ MORE
The Top Risks from Mobile Lawyering and How to Solve Them
The Top Risks from Mobile Lawyering and How to Solve Them

Legal practitioners these days are no longer tied to desks, but instead are on the move, conducting business, taking care of clients, and turning 30-minutes commutes into 30-minutes strategy sessions. While there is no doubt that mobility – both the devices and the power “suite” of apps – helps lawyers take care of business, it’s not without its risks. With such portable endpoints, it’s no surprise that these devices...

READ MORE