1.888.749.9800

BYOD

Reducing the Risks of Shadow IT

I was recently asked to comment on what businesses can do to reduce the security risks of Shadow IT. To read the full article click here and if you just want to read my comments – see below.

Plain talk shadow IT exists when corporate IT is failing in a fundamental way.

Weve seen currency traders set up […]

By |July 19th, 2016|Blog, BYOD|Comments Off on Reducing the Risks of Shadow IT

BYOD Security and the Mobile Market

BYOD security is a frequent topic among IT security experts. This, my third BYOD post this year, focuses on the mobile market. (Post one, Always-on Access Brings Always-Threatening Security Risks, June 25, 2015; Post two, Device Settings that Help Prevent Unauthorized Information Disclosure, July 13, 2015.)

The mobile market continues to be […]

By |November 3rd, 2015|Blog, BYOD|Comments Off on BYOD Security and the Mobile Market
  • Permalink Gallery

    Device Settings that Help Prevent Unauthorized Information Disclosure

Device Settings that Help Prevent Unauthorized Information Disclosure

Following up on my recent post (“Always-on access, brings always threatening security risks”) I’d like to continue the conversation and discuss other device settings that help prevent unauthorized information disclosure.

Many organizations overlook the risks posed by Bluetooth. The security of Bluetooth has been slowly increasing over the years.  When it first appeared many devices had a hardcoded PIN of […]

By |July 13th, 2015|Blog, BYOD, ISO 27002|Comments Off on Device Settings that Help Prevent Unauthorized Information Disclosure

Always-on Access Brings Always-Threatening Security Risks

Always-on access to work for employees comes with always-threatening security risks

One of the controls that appears in ISO 27002, titled Information technology – Security techniques – Code of practice for information security management, suggests  that limiting the period during which connections to computer services are allowed reduces the window of opportunity for unauthorized access.  However, the current […]

By |June 25th, 2015|Blog, BYOD, ISO 27002|Comments Off on Always-on Access Brings Always-Threatening Security Risks
  • Permalink Gallery

    BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

by Nate Lord, Digital Guardian, June 3, 2015

Despite all of the security risks BYOD poses to an IT environment, the trend of businesses embracing bring your own device in the workplace continues to grow at a rapid pace.

Some of the main reasons companies of today are so accepting of BYOD in the workplace usually relates to employee […]

By |June 18th, 2015|BYOD, News & Events|Comments Off on BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach
  • Permalink Gallery

    Getting Your Employees to Buy into Your BYOD Security Policy

Getting Your Employees to Buy into Your BYOD Security Policy

Getting your employees to buy into your BYOD security policy can be challenging. I was recently asked by Sue Poremba, Business News Daily, what pieces of advice I could share with employers to get employees to follow the company’s BYOD security policies. In addition to the tips includes in Sue’s article, I’d like to share my thoughts […]

By |April 8th, 2014|Blog, BYOD|Comments Off on Getting Your Employees to Buy into Your BYOD Security Policy

BYOD Security: Getting Employees to Buy In

By Sue Marquette Poremba

Do you have a Bring Your Own Device (BYOD) security policy in place for your company? If you do, your employees may not be too happy about it: A recent report by technology research firm Gartner found that one-fifth of BYOD policies fail because employees find the rules too restrictive and don’t bother to follow them.

BYOD gives […]

By |April 7th, 2014|BYOD, News & Events|Comments Off on BYOD Security: Getting Employees to Buy In