Your new post is loading...
Your new post is loading...
” Mobile devices can expose users’ and organizations’ valuable data to unauthorized people if necessary precautions are not taken.
|
Scooped by
Gust MEES
|
The Security, Privacy and Legal Implications of BYOD Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks. ===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <=== Read more...
SC Magazine has various news articles and information for IT security professionals. Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security. Read more...
|
Scooped by
Gust MEES
|
The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments globally. Known as the Bring Your Own Device (BYOD) phenomenon, on one hand, there is an opportunity for greatly increased productivity and decreased costs. ===> On the other, there are increased security risks, management issues and even data and device ownership and governance issues. <===
Download free brochures and fact sheets from Microsoft that you can use to teach classes or groups about computer and Internet security.
|
Scooped by
Gust MEES
|
In the face of new threats aimed at OS X, a security expert has warned that Mac users may be even more vulnerable than Windows users. Because Windows users are more likely to be running up-to-date anti-virus programs, Graham Cluley of Sophos says that many Mac users are missing a "valuable safety net". In the face of several new threats targeting Mac OS X that have been discovered in recent weeks, Mac users should make sure that they have some form of protection, Cluley said. However, keeping your computer safe from cybercriminals isn't just a case of having anti-virus programs installed - it's about making sensible choices as well. As we have seen on the Windows platform, the majority of the attacks do not exploit any weakness in the operating system but instead take advantage of the bug in people's brains. ===> Mac users can be just as easily duped as their Windows cousins into making poor choices, and could end up infected as a result, Cluley told Macworld. <=== Use antivirus programs!
|
Scooped by
Gust MEES
|
As ESET's BYOD Infographic shows, BYOD is no LOL matter, bringing with it some serious risks to company networks and data. Based on an ESET Harris Interactive survey. Another BYOD risk factor is the practice of letting someone else use the device. This could be "just" a family member or friend but it introduces the possibility of that person gaining access to the company network or sensitive company data stored on the device. ===> Furthermore, if this "other person" is not trained in safe computing practices there is a serious risk of them getting the device infected or compromised. <===
|
Scooped by
Gust MEES
|
This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD [Interview]Cult of MacOn the front lines of the Bring-Your-Own-Device (BYOD) movement, she's created an iPad class approved by the New York State Continuing Legal Education Board.
Hi, First of all let me tell you that on the beginning when I joined Twitter I really wasn’t a friend of it as I didn’t see its advantages. I am an ICT Course Instructor and also an author who has written a lot of articles, blogs, tutorials and courses who were read +/- 4 million times in total... Here my #SoMe adventure; read more... "A True Story"...
|
Scooped by
Gust MEES
|
These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for. Tim Keanini, CTO of nCircle, says cyberattackers are talented, creative developers who are motivated to find innovative ways to part you from your money or information. Typically, a malicious Web app is a form of Trojan horse: The app claims to be something else--and it may in fact run some legitimate utility or application--but once you click it, it runs malicious code in the background that may compromise your system or secretly download other malicious payloads from the Internet. Speaking of Web apps, Camp warns, "While they allow increased functionality within the browser, users should be aware of how deeply into your system they may be able to reach." ===> Don't assume that you're safe if you avoid Microsoft Windows. Web apps do frequently target specific vulnerabilities, and Windows is often a primary focus, but Web apps--both benign and malicious--are fundamentally platform-agnostic. <=== Gust MEES: check out also my #itsecurity #tutorials (FREE courses) here - http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/ - http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ - http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/
|
Scooped by
Gust MEES
|
|
Scooped by
Gust MEES
|
One day, fellow teachers will shake their heads at the idea that we once confiscated phones from students, refused to give them the school WIFI password, and required permission to use their own laptops in class. After all, today’s students carry with them some of the most powerful learning tools ever known. Why not teach students how to use them, rather than tell them to put them away, to leave them in their lockers or to turn them off? As teacher William Stites says on his blog, “If we want students to communicate, does it matter what tool they use to get the message out?” Gust MEES: "When working with #BYOT and #BYOD, don't forget #itsecurity! More info here: http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD
|
|
Scooped by
Gust MEES
|
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices. ===> The key to keeping your network secure is to manage those devices." <=== Read more...
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization. At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will. Read more...
|
Scooped by
Gust MEES
|
These posters are a great way to raise awareness about good online safety habits and tips. Our 10 posters offer helpful reminders about everything from keeping a long, strong password to making sure your software is up-to-date. We encourage you to download them, print them out and post them in your home, office, classroom community centers or religious establishments to get the word out! You can download the posters by clicking on a thumbnail image below or in our Resource Center. ===> Gust MEES: great initiative, use it, please! <===
Your phone goes everywhere with you. You keep it at your desk at work, near your bed when you sleep, and in your pocket during dinner. Many people use their phones for mobile banking, keeping in close touch with friends and family over Facebook and Twitter, and sending countless text messages about their daily lives. But do our phones deserve the trust we place in the security of all the information we're giving them? If you choose your apps carefully and give out your personal information sparingly, you'll have no problem at all. But if you download everything and give out your name and address every time you can, you'll be making a huge mistake.
Ignorance, as those in IT security know, is not bliss. And, two new studies when viewed together show that consumer ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk. ===> Many organizations unduly place themselves at risk by allowing access to their computers by mobile devices used by employees who download apps without understanding their consequences. That doesn't seems like a smart information risk management policy; actually, it doesn't seem like a policy at all. <===
|
Scooped by
Gust MEES
|
BYOD is now being trialed at a U.S. school as a pilot program. Bring your own device (BYOD) schemes remain contentious in both educational and business networks. In schools, who pays for theft, loss or damage? Can schools force parents to pay for devices as well as the yearly bill of school uniform and text books? Are parents happy with the prospect of their children taking expensive products in to school, where damage is possible? Read more...
|
Scooped by
Gust MEES
|
Network Security and More Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices. “Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.” One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.
Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their network... Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks. This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. Take the example of company-owned laptop issued to an employee. When it comes to security, the company can: - determine and limit the type of devices that can be used; - implement minimum system requirements and configurations; - install security-related software to the device; encrypt company data on the device; - apply security patches; - monitor the use of the device to detect misuse, hacking or malware; - dictate how the device connects to the company’s network; - install and update anti-virus software; - provide support for the device; and obtain/access the device for purposes of an investigation (because the company owns the device).
McAfee's Slavik Markovich and Sean Roth demonstrate how MySQL databases — sitting beneath web applications — need protection from hacks and attacks.
How-To make sure that my shared links are not malicious?
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?". So how do you respond?
WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews to help web users as they search, surf & shop online.
|