BYOD

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Consumer Smartphone Thefts: Why Your Organization Should Pay Attention
Consumer Smartphone Thefts: Why Your Organization Should Pay Attention

A new FCC report by the Technological Advisory Council (TAC) Subcommitte on Mobile Device Theft Prevention (MDTP) shows that mobile phone theft, despite technological improvements and prevention campaigns, still remains critical. The report looked at the theft of smartphones, trying to gather an aggregate picture of the prevalence of smartphone theft. Consumer Reports estimated that 3.1 million smartphones were stolen in 2013 in the United States. The FCC makes its own...

READ MORE
Enterprises Have More Tools to Manage Mobile Devices
Enterprises Have More Tools to Manage Mobile Devices

According to a new survey conducted by the Enterprise Device Alliance (EDA), organizations may be making progress in securing mobile devices. The fourth annual survey, “EDA Mobile Survey,” sought to understand how IT administrators are coping with the impact of smartphones and tablets on organizations. The survey indicates that securing corporate data on mobile devices and controlling access from devices to enterprise resources and data are the most important...

READ MORE
Employee Use of the Cloud Increases Risk of Data Breach
Employee Use of the Cloud Increases Risk of Data Breach

A report out earlier this year by Ponemon for Netskope, “Data Breach: The Cloud Multiplier Effect,” examined the impact that cloud services have had on data breaches. The findings of the data are interesting, as they indicate that the use of cloud services, and thus mobile devices, increases the probabilities that organizations will face an expensive data breach. As we already know, there is a symbiotic relationship between cloud and mobile. One...

READ MORE
Mobile Security Risks Tied to Employees
Mobile Security Risks Tied to Employees

A recent Mobile Security Report conducted by Check Point reinforces one of the most common insights of the year, that mobile security risks are often (if inadvertently) tied to employees. The survey spoke with over 700 IT professionals covering topics such as the perception of threats as well as actual security incidents. Respondents indicate that two-thirds of employees likely contributed to recent data breaches. For 42% of respondents, a mobile security incident has cost more...

READ MORE
CIOs Must Negotiate GRC Even Without Board Support
CIOs Must Negotiate GRC Even Without Board Support

I recently began a series on Finextra on “Working With Your CIO to Negotiate GRC.” In this first part to the series of discussions, I talk about the prevalence and costs associated with data breaches and how many boardrooms have not given appropriate billing to facing data security issues. In the article, I discuss the importance of facing the issues presented by mobile devices, despite lack of board-level support....

READ MORE