Should Mobile Device Data Protection Be Encouraged or Enforced?
How many people in your enterprise use their personal mobile devices for work?
DetailsHow many people in your enterprise use their personal mobile devices for work?
DetailsInformation security, both in-cloud and on-premise, was somewhat higher profile during 2015. The top three threats for the year for cloud environments were (in decreasing order of importance) app attacks, suspicious activity, and brute force.
DetailsWith mobile computing already so widespread and the promise to add billions more attached devices, a large part of your security will be determined by the state of your technology.
DetailsRevelations of government snooping and pressure on cloud providers to provide customer data to authorities have led to new developments in the way encryption is applied with those ready for the Bring Your Own Encryption (BYOE) phase.
DetailsIf you use a cloud service or let your employees access company systems from their own smartphones, you’ve probably already noticed how your IT security perimeters has expanded.
DetailsHave you ever looked at an IT security plan and wondered, “what’s wrong with this picture?” When words like “policy”, “procedure” and even “implementation” are prominent, but others like “user”, “training”, “performance” and “awareness” seem to be pushed into the background, there may be room for improvement. Unless your context is entirely “lights-out” and computer-driven…
Details